Skip to content
Snippets Groups Projects
speaker_cyber_insurance.csv 299 KiB
Newer Older
User expired's avatar
User expired committed
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765
conference;speaker name;company name;talk title;talk abstract;talk duration (minutes);talk agenda (dd:mm:yyyy);#speakers/talk
NetDiligence22;Jon Bateman;Carnegie Endowment for International Peace;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Patrick Bourk;Hub International Canada;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;Stephen Boyce;Magnet Forensics;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;Brian Braden;Crum & Forster;"""Late Nite @ NetDiligence Sponsored by Crum & Forster""";"""NA""";120;01.06.2022;7
NetDiligence22;Mark Camillo;CyberAcuView;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Sherri Davidoff;LMG Security;"""Women In Cyber Luncheon Sponsored By Saul Ewing and Crum & Forster""";"""Join us for one of our favorite traditions, meet new people and reconnect with old friends as we celebrate women in our industry! We look forward to hearing our keynote speaker, Sherri Davidoff, the CEO of LMG Security. Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr LLP.""";120;01.06.2022;3
NetDiligence22;Sherri Davidoff;LMG Security;"""Roundtable: Ransomware Advisory Group""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;01.06.2022;7
NetDiligence22;Erica Davis;Guy Carpenter;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Beth Diamond;Beazley;"""Late Nite @ NetDiligence Sponsored by Crum & Forster""";"""NA""";120;01.06.2022;7
NetDiligence22;Todd Doss;Ankura;"""Roundtable: Ransomware Advisory Group""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;01.06.2022;7
NetDiligence22;Britt Eilhardt;Brown & Brown;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;Evgueni Erchov;Arete;"""Roundtable: Ransomware Advisory Group""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;01.06.2022;7
NetDiligence22;Aideen Gaffney;Epiq;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;Gabriel Gomez;Tracepoint;"""Roundtable: Ransomware Advisory Group""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;01.06.2022;7
NetDiligence22;Billy Gouveia;Surefire Cyber;"""Roundtable: Ransomware Advisory Group""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;01.06.2022;7
NetDiligence22;Shannon Groeber;CFC;"""Late Nite @ NetDiligence Sponsored by Crum & Forster""";"""NA""";120;01.06.2022;7
NetDiligence22;Todd Hindman;IDX;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;Thomas Johansmeyer;Verisk;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Laurie Kamaiko;Saul Ewing Arnstein & Lehr LLP;"""Women In Cyber Luncheon Sponsored By Saul Ewing and Crum & Forster""";"""Join us for one of our favorite traditions, meet new people and reconnect with old friends as we celebrate women in our industry! We look forward to hearing our keynote speaker, Sherri Davidoff, the CEO of LMG Security. Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr LLP.""";120;01.06.2022;3
NetDiligence22;Jason Krauss;WTW;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Annamaria Landaverde;Munich Re;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Jim Leonard;Kroll;"""Late Nite @ NetDiligence Sponsored by Crum & Forster""";"""NA""";120;01.06.2022;7
NetDiligence22;Nathan Little;Tetra Defense;"""Roundtable: Ransomware Advisory Group""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;01.06.2022;7
NetDiligence22;Matthew McCabe;Kivu;"""Roundtable: Ransomware Advisory Group""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;01.06.2022;7
NetDiligence22;Leigh McMullan;Crum & Forster;"""Women In Cyber Luncheon Sponsored By Saul Ewing and Crum & Forster""";"""Join us for one of our favorite traditions, meet new people and reconnect with old friends as we celebrate women in our industry! We look forward to hearing our keynote speaker, Sherri Davidoff, the CEO of LMG Security. Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr LLP.""";120;01.06.2022;3
NetDiligence22;Mikel Pearce;CyberClan;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;William Pitt;Conning;"""Late Nite @ NetDiligence Sponsored by Crum & Forster""";"""NA""";120;01.06.2022;7
NetDiligence22;Matthew Prevost;Chubb;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Evan Roberts;FTI Consulting;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;Anna Rudawski;Norton Rose Fulbright LLP;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;Tamara Snowdon;Marsh;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Violet Sullivan;Redpoint Cybersecurity;"""Workshop: Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.""";90;01.06.2022;9
NetDiligence22;Vince Vitkowsky;Seiger Gfeller Laurie LLP;"""Advanced Seminar: Cyber War & Terrorism""";"""In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools).""";90;01.06.2022;9
NetDiligence22;Lori Bailey;Corvus Insurance;"""Late Nite @ NetDiligence Sponsored by Crum & Forster""";"""NA""";120;01.06.2022;7
NetDiligence22;Matthew Shanks;Amwins;"""Late Nite @ NetDiligence Sponsored by Crum & Forster""";"""NA""";120;01.06.2022;7
NetDiligence22;Brian Abellera;US Federal Bureau of Investigations;"""Breakout C: Beyond the Arrest: Law Enforcement Roundtable""";"""Global Cyber Threatscape, Role of US Cyber Law Enforcement & Intelligence Overseas, Unique Characteristics of US-Canada Cyber, Importance of Unifying Efforts to Defend Against Cyber Threats, International Cooperation--Public & Private""";50;02.06.2022;5
NetDiligence22;Eric Adams;US Secret Service;"""Breakout C: Beyond the Arrest: Law Enforcement Roundtable""";"""Global Cyber Threatscape, Role of US Cyber Law Enforcement & Intelligence Overseas, Unique Characteristics of US-Canada Cyber, Importance of Unifying Efforts to Defend Against Cyber Threats, International Cooperation--Public & Private""";50;02.06.2022;5
NetDiligence22;Alexandra Bretschneider;Johnson Kendall & Johnson;"""Breakout A: State of the Market: Smells Like Teen Spirit""";"""Long-Term Viability & Sustainability, Detecting the Weak Links: How intrusive can we be? Pricing & Controls, Need for Security Standards, Innovation""";50;02.06.2022;5
NetDiligence22;Joseph Bruemmer;BakerHostetler;"""Breakout B: What Really Happens When You Negotiate with a Hacker: An Insider’s View""";"""In this session we will explore the mysterious world of ransomware extortion negotiations. You will hear directly from a professional ransomware extortion negotiator and dive into the multiple issues an organization may need to navigate in the facilitation of extortion payments. How do you get immediate access to bitcoin? Do hackers negotiate, and by how much? Do they return your data if you pay? How long does it take to get your data back and recover? Do they carry out their threats to destroy or publicize your sensitive data if you don’t pay? What role does law enforcement play? What Federal laws need to be complied with? How does cyber insurance play a part in all of this?""";50;02.06.2022;3
NetDiligence22;Michael Bruemmer;Experian;"""Breakout C: Beyond the Arrest: Law Enforcement Roundtable""";"""Global Cyber Threatscape, Role of US Cyber Law Enforcement & Intelligence Overseas, Unique Characteristics of US-Canada Cyber, Importance of Unifying Efforts to Defend Against Cyber Threats, International Cooperation--Public & Private""";50;02.06.2022;5
NetDiligence22;John Butler;CNA;"""Plenary: Cyber Insurance: Leveraging the Trillion Dollar Opportunity""";"""Supply of Capacity & Why is it Fundamentally Limited, Drivers of Demand & Quantifying Demand Growth, Bridging the Supply/Demand Growth, Capitalizing on the Opportunity, Creating Accessibility to Cyber Insurance for All Organizations""";50;02.06.2022;5
NetDiligence22;Kelly Castriotta;Markel;"""Plenary: Cyber Insurance: Leveraging the Trillion Dollar Opportunity""";"""Supply of Capacity & Why is it Fundamentally Limited, Drivers of Demand & Quantifying Demand Growth, Bridging the Supply/Demand Growth, Capitalizing on the Opportunity, Creating Accessibility to Cyber Insurance for All Organizations""";50;02.06.2022;5
NetDiligence22;Guillermo Christensen;K&L Gates;"""Lunch Sponsored by Sophos""";"""Presentation of the Annual Toby Merrill Awards, ""The FBI's Role in Incident Response,"" a Fireside Chat with Bryan Vorndran, Assistant Director, Cyber Division, FBI""";75;02.06.2022;2
NetDiligence22;Jason Conboy;US Department of Homeland Security;"""Breakout C: Beyond the Arrest: Law Enforcement Roundtable""";"""Global Cyber Threatscape, Role of US Cyber Law Enforcement & Intelligence Overseas, Unique Characteristics of US-Canada Cyber, Importance of Unifying Efforts to Defend Against Cyber Threats, International Cooperation--Public & Private""";50;02.06.2022;5
NetDiligence22;Jennifer Coughlin;Mullen Coughlin Lcc;"""Plenary Session: 2022 Claims & Losses Update""";"""The 2021 NetDiligence Cyber Claims Study. Current 2022 Data. Report from the Trenches: Carrier & Breach Coach. Future Predictions""";50;02.06.2022;5
NetDiligence22;Gwenn Cujdik;AXA XL;"""Plenary Session: 2022 Claims & Losses Update""";"""The 2021 NetDiligence Cyber Claims Study. Current 2022 Data. Report from the Trenches: Carrier & Breach Coach. Future Predictions""";50;02.06.2022;5
NetDiligence22;Anjali Das;Wilson Elser LLP;"""Breakout B: U.S. Regulatory Update: View from the States""";"""Law Enforcement Infrastructure, Cross-Agency Connections, Coordination & Themed Investigation Model, Working with Third Party Vendors, Building a Safe & Secure Digital Environment, Circular Approach to Working with At-Risk Groups""";50;02.06.2022;4
NetDiligence22;Christiaan Durdaller;INSUREtrust;"""Breakout A: Getting Renewal Ready""";"""Understanding Real Digital Risk, Inside-Out Analysis, Broadening the Strategy, Understanding the Contents of the Digital Asset, Quantifying the Risk & Accounting for It""";50;02.06.2022;5
NetDiligence22;Brook Dutcher;Allied World;"""Breakout A: Security Standards: What We Have, What We Need""";"""Need for Relevant, Actionable Information, What are Essential Practices, Insider Threat Visibility, Do NIST, ISO, WISP, etc. fall short?, Disparity Between Meeting a Requirement and Actually Being Secure""";50;02.06.2022;5
NetDiligence22;Nick Economidis;Crum & Forster;"""Breakout B: FinTech Risks: Cyber and Tech E&O""";"""What is Decentralized Finance (DeFi) , Blending Traditional FI (Financial Institutions) and Digital Assets , Types of FinTech services within B2B and B2C, Common Tech Platforms Include SaaS, CaaS, Differences in Regulation, Underwriting Challenges for Non-Standard Solutions, End-to-End Safekeeping of Digital Assets, Forensic Accounting Process to Determine BI Loss""";50;02.06.2022;5
NetDiligence22;Evgueni Erchov;Arete;"""Breakout B: What Really Happens When You Negotiate with a Hacker: An Insider’s View""";"""In this session we will explore the mysterious world of ransomware extortion negotiations. You will hear directly from a professional ransomware extortion negotiator and dive into the multiple issues an organization may need to navigate in the facilitation of extortion payments. How do you get immediate access to bitcoin? Do hackers negotiate, and by how much? Do they return your data if you pay? How long does it take to get your data back and recover? Do they carry out their threats to destroy or publicize your sensitive data if you don’t pay? What role does law enforcement play? What Federal laws need to be complied with? How does cyber insurance play a part in all of this?""";50;02.06.2022;3
NetDiligence22;John Farley;Gallagher;"""Breakout B: What Really Happens When You Negotiate with a Hacker: An Insider’s View""";"""In this session we will explore the mysterious world of ransomware extortion negotiations. You will hear directly from a professional ransomware extortion negotiator and dive into the multiple issues an organization may need to navigate in the facilitation of extortion payments. How do you get immediate access to bitcoin? Do hackers negotiate, and by how much? Do they return your data if you pay? How long does it take to get your data back and recover? Do they carry out their threats to destroy or publicize your sensitive data if you don’t pay? What role does law enforcement play? What Federal laws need to be complied with? How does cyber insurance play a part in all of this?""";50;02.06.2022;3
NetDiligence22;Jamil Farshchi;Equifax;"""Breakout C: CISO Round-Up: What Keeps You Up at Night?""";"""Technological Focus on Current Threats & Priorities, Technology as a Tool & as a Risk, Governance & Compliance Within Their Role, Integrating Risk Management Into the Insurance Process""";50;02.06.2022;4
NetDiligence22;Gene Fishel;Virginia Attorney General's Office;"""Breakout B: U.S. Regulatory Update: View from the States""";"""Law Enforcement Infrastructure, Cross-Agency Connections, Coordination & Themed Investigation Model, Working with Third Party Vendors, Building a Safe & Secure Digital Environment, Circular Approach to Working with At-Risk Groups""";50;02.06.2022;4
NetDiligence22;Mark Greisiger;NetDiligence;"""Opening Remarks & Keynote Address""";"""Opening Remarks and Welcome. Keynote Address by Tony Kuczinski, President & CEO, Munich Re US Holding""";60;02.06.2022;3
NetDiligence22;Mark Greisiger;NetDiligence;"""Plenary Session: 2022 Claims & Losses Update""";"""The 2021 NetDiligence Cyber Claims Study. Current 2022 Data. Report from the Trenches: Carrier & Breach Coach. Future Predictions""";50;02.06.2022;5
NetDiligence22;Peter Halprin;Pasich LLP;"""Breakout B: Fines & Penalties""";"""Global Trends in Cyber Risk Fines & Penalties, Insurability & Coverage, Applicability & Challenges Around Insurance Valuation, Future Predictions""";50;02.06.2022;5
NetDiligence22;Doug Howard;Pondurance;"""Breakout C: CISO Round-Up: What Keeps You Up at Night?""";"""Technological Focus on Current Threats & Priorities, Technology as a Tool & as a Risk, Governance & Compliance Within Their Role, Integrating Risk Management Into the Insurance Process""";50;02.06.2022;4
NetDiligence22;Jacob Ingerslev;Tokio Marine HCC;"""Breakout A: State of the Market: Smells Like Teen Spirit""";"""Long-Term Viability & Sustainability, Detecting the Weak Links: How intrusive can we be? Pricing & Controls, Need for Security Standards, Innovation""";50;02.06.2022;5
NetDiligence22;Lisa Jaffee;Hiscox;"""Breakout C: The Evolving Roles of Claims Professionals & Breach Coaches in Incident Response""";"""Common Roles for Claims Professionals, Brokers & Breach Coaches, How are these roles evolving? Working Together to Reduce Costs & Manage Claims Efficiently, Impact on Insureds & View of the Broker, More to the Breach Coach than Just ""Privilege?"", Moving to Task-Based Fee Pricing or Flat Fees""";50;02.06.2022;5
NetDiligence22;Mike Karbassi;Corvus Insurance;"""Breakout A: Getting Renewal Ready""";"""Understanding Real Digital Risk, Inside-Out Analysis, Broadening the Strategy, Understanding the Contents of the Digital Asset, Quantifying the Risk & Accounting for It""";50;02.06.2022;5
NetDiligence22;Erin Kenneally;SentinelOne;"""Breakout A: The Path to Lower Loss Ratios: Effective Controls & Inside Visibility""";"""Roles & Capabilities of Insurers & Brokers in Assessing Technical Cyber Risk, How Technical Cyber Risk Assessment Impact Policy Terms, Premiums & Availability of Cyber Insurance, Is the Industry Evolving to Embrace to Embrace Better Data & Enforce Pre-Event Controls, How Relationships Between Insurers, Policyholders & Cybersecurity Providers Enable Effective Controls & Internal Visibility """;50;02.06.2022;5
NetDiligence22;Tony Kuczinski;Munich Re;"""Opening Remarks & Keynote Address""";"""Opening Remarks and Welcome. Keynote Address by Tony Kuczinski, President & CEO, Munich Re US Holding""";60;02.06.2022;3
NetDiligence22;Taylor Lehmann;Google;"""Breakout C: CISO Round-Up: What Keeps You Up at Night?""";"""Technological Focus on Current Threats & Priorities, Technology as a Tool & as a Risk, Governance & Compliance Within Their Role, Integrating Risk Management Into the Insurance Process""";50;02.06.2022;4
NetDiligence22;Olga Livingston;Cybersecurity and Infrastructure Security Agency;"""Breakout A: The Path to Lower Loss Ratios: Effective Controls & Inside Visibility""";"""Roles & Capabilities of Insurers & Brokers in Assessing Technical Cyber Risk, How Technical Cyber Risk Assessment Impact Policy Terms, Premiums & Availability of Cyber Insurance, Is the Industry Evolving to Embrace to Embrace Better Data & Enforce Pre-Event Controls, How Relationships Between Insurers, Policyholders & Cybersecurity Providers Enable Effective Controls & Internal Visibility """;50;02.06.2022;5
NetDiligence22;Michele Lucan;Connecticut Attorney General's Office;"""Breakout B: U.S. Regulatory Update: View from the States""";"""Law Enforcement Infrastructure, Cross-Agency Connections, Coordination & Themed Investigation Model, Working with Third Party Vendors, Building a Safe & Secure Digital Environment, Circular Approach to Working with At-Risk Groups""";50;02.06.2022;4
NetDiligence22;Gordon Malin;Elpha Secure;"""Plenary: Cyber Insurance: Leveraging the Trillion Dollar Opportunity""";"""Supply of Capacity & Why is it Fundamentally Limited, Drivers of Demand & Quantifying Demand Growth, Bridging the Supply/Demand Growth, Capitalizing on the Opportunity, Creating Accessibility to Cyber Insurance for All Organizations""";50;02.06.2022;5
NetDiligence22;Benjamin Mancuso;Ascot Group;"""Breakout A: The Path to Lower Loss Ratios: Effective Controls & Inside Visibility""";"""Roles & Capabilities of Insurers & Brokers in Assessing Technical Cyber Risk, How Technical Cyber Risk Assessment Impact Policy Terms, Premiums & Availability of Cyber Insurance, Is the Industry Evolving to Embrace to Embrace Better Data & Enforce Pre-Event Controls, How Relationships Between Insurers, Policyholders & Cybersecurity Providers Enable Effective Controls & Internal Visibility """;50;02.06.2022;5
NetDiligence22;Chris Martino;Arete;"""Breakout C: Small Business, Big Security: How Small & Medium Size Business Can Prepare for Incidents""";"""Cyber Challenges for the Small & Medium Sized Business, Defensive & Offensive Tactics, Building Resilience, Role of the Managed Service Provider""";50;02.06.2022;4
NetDiligence22;John Menefee;Travelers;"""Breakout C: Small Business, Big Security: How Small & Medium Size Business Can Prepare for Incidents""";"""Cyber Challenges for the Small & Medium Sized Business, Defensive & Offensive Tactics, Building Resilience, Role of the Managed Service Provider""";50;02.06.2022;4
NetDiligence22;Sadia Mirza;Troutman Pepper LLP;"""Breakout C: The Evolving Roles of Claims Professionals & Breach Coaches in Incident Response""";"""Common Roles for Claims Professionals, Brokers & Breach Coaches, How are these roles evolving? Working Together to Reduce Costs & Manage Claims Efficiently, Impact on Insureds & View of the Broker, More to the Breach Coach than Just ""Privilege?"", Moving to Task-Based Fee Pricing or Flat Fees""";50;02.06.2022;5
NetDiligence22;Lisa Morris;MDD Forensic Accountants;"""Breakout B: FinTech Risks: Cyber and Tech E&O""";"""What is Decentralized Finance (DeFi) , Blending Traditional FI (Financial Institutions) and Digital Assets , Types of FinTech services within B2B and B2C, Common Tech Platforms Include SaaS, CaaS, Differences in Regulation, Underwriting Challenges for Non-Standard Solutions, End-to-End Safekeeping of Digital Assets, Forensic Accounting Process to Determine BI Loss""";50;02.06.2022;5
NetDiligence22;Timothy Murphy;Office of Attorney General for the Commonwealth of Pennsylvania;"""Breakout B: U.S. Regulatory Update: View from the States""";"""Law Enforcement Infrastructure, Cross-Agency Connections, Coordination & Themed Investigation Model, Working with Third Party Vendors, Building a Safe & Secure Digital Environment, Circular Approach to Working with At-Risk Groups""";50;02.06.2022;4
NetDiligence22;Keith Novak;Kroll;"""Breakout A: Security Standards: What We Have, What We Need""";"""Need for Relevant, Actionable Information, What are Essential Practices, Insider Threat Visibility, Do NIST, ISO, WISP, etc. fall short?, Disparity Between Meeting a Requirement and Actually Being Secure""";50;02.06.2022;5
NetDiligence22;Heather Osborne;NetDiligence;"""Opening Remarks & Keynote Address""";"""Opening Remarks and Welcome. Keynote Address by Tony Kuczinski, President & CEO, Munich Re US Holding""";60;02.06.2022;3
NetDiligence22;Stephen Palley;Anderson Kill;"""Breakout B: FinTech Risks: Cyber and Tech E&O""";"""What is Decentralized Finance (DeFi) , Blending Traditional FI (Financial Institutions) and Digital Assets , Types of FinTech services within B2B and B2C, Common Tech Platforms Include SaaS, CaaS, Differences in Regulation, Underwriting Challenges for Non-Standard Solutions, End-to-End Safekeeping of Digital Assets, Forensic Accounting Process to Determine BI Loss""";50;02.06.2022;5
NetDiligence22;Robert Parisi;Munich Re;"""Breakout A: Getting Renewal Ready""";"""Understanding Real Digital Risk, Inside-Out Analysis, Broadening the Strategy, Understanding the Contents of the Digital Asset, Quantifying the Risk & Accounting for It""";50;02.06.2022;5
NetDiligence22;Mayur Patel;Munich Re;"""Breakout B: FinTech Risks: Cyber and Tech E&O""";"""What is Decentralized Finance (DeFi) , Blending Traditional FI (Financial Institutions) and Digital Assets , Types of FinTech services within B2B and B2C, Common Tech Platforms Include SaaS, CaaS, Differences in Regulation, Underwriting Challenges for Non-Standard Solutions, End-to-End Safekeeping of Digital Assets, Forensic Accounting Process to Determine BI Loss""";50;02.06.2022;5
NetDiligence22;Payal Patel;Marsh;"""Breakout A: State of the Market: Smells Like Teen Spirit""";"""Long-Term Viability & Sustainability, Detecting the Weak Links: How intrusive can we be? Pricing & Controls, Need for Security Standards, Innovation""";50;02.06.2022;5
NetDiligence22;Michael Phillips;Resilience Insurance;"""Breakout B: Fines & Penalties""";"""Global Trends in Cyber Risk Fines & Penalties, Insurability & Coverage, Applicability & Challenges Around Insurance Valuation, Future Predictions""";50;02.06.2022;5
NetDiligence22;Claudia Piccirilli;WTW;"""Breakout A: The Path to Lower Loss Ratios: Effective Controls & Inside Visibility""";"""Roles & Capabilities of Insurers & Brokers in Assessing Technical Cyber Risk, How Technical Cyber Risk Assessment Impact Policy Terms, Premiums & Availability of Cyber Insurance, Is the Industry Evolving to Embrace to Embrace Better Data & Enforce Pre-Event Controls, How Relationships Between Insurers, Policyholders & Cybersecurity Providers Enable Effective Controls & Internal Visibility """;50;02.06.2022;5
NetDiligence22;Bernard Regan;Baker Tilly Virchow Krause / LLP;"""Breakout B: Fines & Penalties""";"""Global Trends in Cyber Risk Fines & Penalties, Insurability & Coverage, Applicability & Challenges Around Insurance Valuation, Future Predictions""";50;02.06.2022;5
NetDiligence22;Matthew Robinson;Royal Canadian Mounted Police;"""Breakout C: Beyond the Arrest: Law Enforcement Roundtable""";"""Global Cyber Threatscape, Role of US Cyber Law Enforcement & Intelligence Overseas, Unique Characteristics of US-Canada Cyber, Importance of Unifying Efforts to Defend Against Cyber Threats, International Cooperation--Public & Private""";50;02.06.2022;5
NetDiligence22;Robert Rosenzweig;Risk Strategies;"""Breakout A: State of the Market: Smells Like Teen Spirit""";"""Long-Term Viability & Sustainability, Detecting the Weak Links: How intrusive can we be? Pricing & Controls, Need for Security Standards, Innovation""";50;02.06.2022;5
NetDiligence22;Catherine Rudow;Nationwide;"""Breakout A: The Path to Lower Loss Ratios: Effective Controls & Inside Visibility""";"""Roles & Capabilities of Insurers & Brokers in Assessing Technical Cyber Risk, How Technical Cyber Risk Assessment Impact Policy Terms, Premiums & Availability of Cyber Insurance, Is the Industry Evolving to Embrace to Embrace Better Data & Enforce Pre-Event Controls, How Relationships Between Insurers, Policyholders & Cybersecurity Providers Enable Effective Controls & Internal Visibility """;50;02.06.2022;5
NetDiligence22;Neeraj Sahni;Aon;"""Breakout B: FinTech Risks: Cyber and Tech E&O""";"""What is Decentralized Finance (DeFi) , Blending Traditional FI (Financial Institutions) and Digital Assets , Types of FinTech services within B2B and B2C, Common Tech Platforms Include SaaS, CaaS, Differences in Regulation, Underwriting Challenges for Non-Standard Solutions, End-to-End Safekeeping of Digital Assets, Forensic Accounting Process to Determine BI Loss""";50;02.06.2022;5
NetDiligence22;Natalia Santiago;McGriff / Seibels & Williams;"""Breakout C: The Evolving Roles of Claims Professionals & Breach Coaches in Incident Response""";"""Common Roles for Claims Professionals, Brokers & Breach Coaches, How are these roles evolving? Working Together to Reduce Costs & Manage Claims Efficiently, Impact on Insureds & View of the Broker, More to the Breach Coach than Just ""Privilege?"", Moving to Task-Based Fee Pricing or Flat Fees""";50;02.06.2022;5
NetDiligence22;Michael Sarlo;HaystackID;"""Breakout C: The Evolving Roles of Claims Professionals & Breach Coaches in Incident Response""";"""Common Roles for Claims Professionals, Brokers & Breach Coaches, How are these roles evolving? Working Together to Reduce Costs & Manage Claims Efficiently, Impact on Insureds & View of the Broker, More to the Breach Coach than Just ""Privilege?"", Moving to Task-Based Fee Pricing or Flat Fees""";50;02.06.2022;5
NetDiligence22;Grace Seigle;Gallagher Re;"""Plenary: Cyber Insurance: Leveraging the Trillion Dollar Opportunity""";"""Supply of Capacity & Why is it Fundamentally Limited, Drivers of Demand & Quantifying Demand Growth, Bridging the Supply/Demand Growth, Capitalizing on the Opportunity, Creating Accessibility to Cyber Insurance for All Organizations""";50;02.06.2022;5
NetDiligence22;Judy Selby;Kennedys;"""Breakout B: Fines & Penalties""";"""Global Trends in Cyber Risk Fines & Penalties, Insurability & Coverage, Applicability & Challenges Around Insurance Valuation, Future Predictions""";50;02.06.2022;5
NetDiligence22;John Seo;Fermat Capital Management LLC;"""Plenary: Cyber Insurance: Leveraging the Trillion Dollar Opportunity""";"""Supply of Capacity & Why is it Fundamentally Limited, Drivers of Demand & Quantifying Demand Growth, Bridging the Supply/Demand Growth, Capitalizing on the Opportunity, Creating Accessibility to Cyber Insurance for All Organizations""";50;02.06.2022;5
NetDiligence22;Eric Seyfried;AXIS Insurance;"""Breakout A: State of the Market: Smells Like Teen Spirit""";"""Long-Term Viability & Sustainability, Detecting the Weak Links: How intrusive can we be? Pricing & Controls, Need for Security Standards, Innovation""";50;02.06.2022;5
NetDiligence22;Hussein Syed;RWJBarnabas Health;"""Breakout C: CISO Round-Up: What Keeps You Up at Night?""";"""Technological Focus on Current Threats & Priorities, Technology as a Tool & as a Risk, Governance & Compliance Within Their Role, Integrating Risk Management Into the Insurance Process""";50;02.06.2022;4
NetDiligence22;Scott Tenenbaum;AXIS Insurance;"""Plenary Session: 2022 Claims & Losses Update""";"""The 2021 NetDiligence Cyber Claims Study. Current 2022 Data. Report from the Trenches: Carrier & Breach Coach. Future Predictions""";50;02.06.2022;5
NetDiligence22;Caroline Thompson;Cowbell Cyber;"""Breakout C: Small Business, Big Security: How Small & Medium Size Business Can Prepare for Incidents""";"""Cyber Challenges for the Small & Medium Sized Business, Defensive & Offensive Tactics, Building Resilience, Role of the Managed Service Provider""";50;02.06.2022;4
NetDiligence22;Matthew Tucci;Sompo International;"""Plenary Session: 2022 Claims & Losses Update""";"""The 2021 NetDiligence Cyber Claims Study. Current 2022 Data. Report from the Trenches: Carrier & Breach Coach. Future Predictions""";50;02.06.2022;5
NetDiligence22;Shawn Tuma;Spencer Fane LLP;"""Breakout C: The Evolving Roles of Claims Professionals & Breach Coaches in Incident Response""";"""Common Roles for Claims Professionals, Brokers & Breach Coaches, How are these roles evolving? Working Together to Reduce Costs & Manage Claims Efficiently, Impact on Insureds & View of the Broker, More to the Breach Coach than Just ""Privilege?"", Moving to Task-Based Fee Pricing or Flat Fees""";50;02.06.2022;5
NetDiligence22;Harry Valetk;Baker McKenzie;"""Breakout B: Fines & Penalties""";"""Global Trends in Cyber Risk Fines & Penalties, Insurability & Coverage, Applicability & Challenges Around Insurance Valuation, Future Predictions""";50;02.06.2022;5
NetDiligence22;Reuben Vandeventer;SecondSight;"""Breakout A: Getting Renewal Ready""";"""Understanding Real Digital Risk, Inside-Out Analysis, Broadening the Strategy, Understanding the Contents of the Digital Asset, Quantifying the Risk & Accounting for It""";50;02.06.2022;5
NetDiligence22;Bryan Vorndran;US Federal Bureau of Investigation;"""Lunch Sponsored by Sophos""";"""Presentation of the Annual Toby Merrill Awards, ""The FBI's Role in Incident Response,"" a Fireside Chat with Bryan Vorndran, Assistant Director, Cyber Division, FBI""";75;02.06.2022;2
NetDiligence22;Aubrey Weaver;Lewis Brisbois Bisgaard & Smith LLP;"""Breakout A: Security Standards: What We Have, What We Need""";"""Need for Relevant, Actionable Information, What are Essential Practices, Insider Threat Visibility, Do NIST, ISO, WISP, etc. fall short?, Disparity Between Meeting a Requirement and Actually Being Secure""";50;02.06.2022;5
NetDiligence22;Marcin Weryk;Coalition;"""Breakout C: Small Business, Big Security: How Small & Medium Size Business Can Prepare for Incidents""";"""Cyber Challenges for the Small & Medium Sized Business, Defensive & Offensive Tactics, Building Resilience, Role of the Managed Service Provider""";50;02.06.2022;4
NetDiligence22;Michael Wilkinson;Avertium;"""Breakout A: Security Standards: What We Have, What We Need""";"""Need for Relevant, Actionable Information, What are Essential Practices, Insider Threat Visibility, Do NIST, ISO, WISP, etc. fall short?, Disparity Between Meeting a Requirement and Actually Being Secure""";50;02.06.2022;5
NetDiligence22;Nathanael Williams;Fox Rothschild LLP;"""Breakout A: Security Standards: What We Have, What We Need""";"""Need for Relevant, Actionable Information, What are Essential Practices, Insider Threat Visibility, Do NIST, ISO, WISP, etc. fall short?, Disparity Between Meeting a Requirement and Actually Being Secure""";50;02.06.2022;5
NetDiligence22;John Beers;Moxfive;"""Breakout A: Getting Renewal Ready""";"""Understanding Real Digital Risk, Inside-Out Analysis, Broadening the Strategy, Understanding the Contents of the Digital Asset, Quantifying the Risk & Accounting for It""";50;02.06.2022;5
NetDiligence22;John Anderson;Cyber Cube Analytics;"""Breakout B: Use of Analytical Tools in the Cyber Ecosystem""";"""Techniques and Solutions to Gain Understanding of Cyber Exposure, Understanding & Responding to Critical Vulnerabilities , Market Modeling, Portfolio Modeling, External vs Internal Policyholder Scans, Monitoring Change in Environment""";50;03.06.2022;5
NetDiligence22;Ben Auton;SpearTip;"""Breakout A: Cloud Based Incident Response""";"""Differences Between Traditional & Cloud-Based Incident Response, Threat Landscape as it Applies to the Cloud, Challenges with DFIR in the Cloud, Effective & Efficient Response to Cloud IR Matters""";50;03.06.2022;5
NetDiligence22;Ian Bird ;Guidewire;"""Breakout B: Subrogation in Cyber Claims Related to Business Interruption & Contingent Business Interruption""";"""Infrastructure and Infrastructure Adjacent Vulnerabilities, Service Provider Outlook at Aggregative Claims, Service Level Agreement Implications, The Use of Models & Analytics to Identify Claims Opportunistic for Subrogation""";50;03.06.2022;4
NetDiligence22;Ashlie Blanca;Palo Alto Networks | Unit 42;"""Breakout A: Cloud Based Incident Response""";"""Differences Between Traditional & Cloud-Based Incident Response, Threat Landscape as it Applies to the Cloud, Challenges with DFIR in the Cloud, Effective & Efficient Response to Cloud IR Matters""";50;03.06.2022;5
NetDiligence22;John Brewer;HaystackID;"""Breakout B: Use of Analytical Tools in the Cyber Ecosystem""";"""Techniques and Solutions to Gain Understanding of Cyber Exposure, Understanding & Responding to Critical Vulnerabilities , Market Modeling, Portfolio Modeling, External vs Internal Policyholder Scans, Monitoring Change in Environment""";50;03.06.2022;5
NetDiligence22;Erin Burns;INSUREtrust;"""Breakout B: Use of Analytical Tools in the Cyber Ecosystem""";"""Techniques and Solutions to Gain Understanding of Cyber Exposure, Understanding & Responding to Critical Vulnerabilities , Market Modeling, Portfolio Modeling, External vs Internal Policyholder Scans, Monitoring Change in Environment""";50;03.06.2022;5
NetDiligence22;Guillermo Christensen;K&L Gates;"""Breakout A: The Evolution of Ransomware & Its Impact on OFAC Compliance""";"""Applying OFAC Compliance Lessons from Non-Cyber Issues to Ransomware, Considering ""Risk Based"" Compliance When Dealing with Criminals, Application of OFAC's 50% Rule to a Ransomware-as-a-Service Model, Why Threat Intelligence in this Context is More Like Attribution""";50;03.06.2022;5
NetDiligence22;Anthony Dolce;The Hartford;"""Breakout B: Subrogation in Cyber Claims Related to Business Interruption & Contingent Business Interruption""";"""Infrastructure and Infrastructure Adjacent Vulnerabilities, Service Provider Outlook at Aggregative Claims, Service Level Agreement Implications, The Use of Models & Analytics to Identify Claims Opportunistic for Subrogation""";50;03.06.2022;4
NetDiligence22;Meghan Farally;Cipriani & Werner PC;"""Breakout A: The Evolution of Ransomware & Its Impact on OFAC Compliance""";"""Applying OFAC Compliance Lessons from Non-Cyber Issues to Ransomware, Considering ""Risk Based"" Compliance When Dealing with Criminals, Application of OFAC's 50% Rule to a Ransomware-as-a-Service Model, Why Threat Intelligence in this Context is More Like Attribution""";50;03.06.2022;5
NetDiligence22;Arthur Freer;eSentire;"""Breakout A: Cloud Based Incident Response""";"""Differences Between Traditional & Cloud-Based Incident Response, Threat Landscape as it Applies to the Cloud, Challenges with DFIR in the Cloud, Effective & Efficient Response to Cloud IR Matters""";50;03.06.2022;5
NetDiligence22;Meghan Hannes;Beazley;"""Plenary: Why Talent Issues are a Bigger Threat than Ransomware""";"""Talent Market Overview, Causes for the Shortage of Talent, Impact on the Industry,, Best Practices for Acquisition, Development & Retention of Talent, How to Move the Industry Forward""";50;03.06.2022;5
NetDiligence22;Sean Hoar;Lewis Brisbois;"""Plenary: Why Talent Issues are a Bigger Threat than Ransomware""";"""Talent Market Overview, Causes for the Shortage of Talent, Impact on the Industry,, Best Practices for Acquisition, Development & Retention of Talent, How to Move the Industry Forward""";50;03.06.2022;5
NetDiligence22;Laurie Kamaiko;Saul Ewing Arnstein & Lehr LLP;"""Breakout B: Subrogation in Cyber Claims Related to Business Interruption & Contingent Business Interruption""";"""Infrastructure and Infrastructure Adjacent Vulnerabilities, Service Provider Outlook at Aggregative Claims, Service Level Agreement Implications, The Use of Models & Analytics to Identify Claims Opportunistic for Subrogation""";50;03.06.2022;4
NetDiligence22;Perry Lee;AIG;"""Breakout B: Use of Analytical Tools in the Cyber Ecosystem""";"""Techniques and Solutions to Gain Understanding of Cyber Exposure, Understanding & Responding to Critical Vulnerabilities , Market Modeling, Portfolio Modeling, External vs Internal Policyholder Scans, Monitoring Change in Environment""";50;03.06.2022;5
NetDiligence22;Matthew Leidlein;Digital Asset Redemption;"""Breakout A: The Evolution of Ransomware & Its Impact on OFAC Compliance""";"""Applying OFAC Compliance Lessons from Non-Cyber Issues to Ransomware, Considering ""Risk Based"" Compliance When Dealing with Criminals, Application of OFAC's 50% Rule to a Ransomware-as-a-Service Model, Why Threat Intelligence in this Context is More Like Attribution""";50;03.06.2022;5
NetDiligence22;Spencer Pollock;McDonald Hopkins;"""Breakout A: Cloud Based Incident Response""";"""Differences Between Traditional & Cloud-Based Incident Response, Threat Landscape as it Applies to the Cloud, Challenges with DFIR in the Cloud, Effective & Efficient Response to Cloud IR Matters""";50;03.06.2022;5
NetDiligence22;Brian Robb;Berkshire Hathaway Specialty Insurance;"""Plenary: Why Talent Issues are a Bigger Threat than Ransomware""";"""Talent Market Overview, Causes for the Shortage of Talent, Impact on the Industry,, Best Practices for Acquisition, Development & Retention of Talent, How to Move the Industry Forward""";50;03.06.2022;5
NetDiligence22;Anna Sarnek;SecurityScorecard;"""Breakout B: Use of Analytical Tools in the Cyber Ecosystem""";"""Techniques and Solutions to Gain Understanding of Cyber Exposure, Understanding & Responding to Critical Vulnerabilities , Market Modeling, Portfolio Modeling, External vs Internal Policyholder Scans, Monitoring Change in Environment""";50;03.06.2022;5
NetDiligence22;Karl Sharman;Stott and May Inc.;"""Plenary: Why Talent Issues are a Bigger Threat than Ransomware""";"""Talent Market Overview, Causes for the Shortage of Talent, Impact on the Industry,, Best Practices for Acquisition, Development & Retention of Talent, How to Move the Industry Forward""";50;03.06.2022;5
NetDiligence22;Richard Sheridan;Berkley Cyber Risk Solutions;"""Breakout A: The Evolution of Ransomware & Its Impact on OFAC Compliance""";"""Applying OFAC Compliance Lessons from Non-Cyber Issues to Ransomware, Considering ""Risk Based"" Compliance When Dealing with Criminals, Application of OFAC's 50% Rule to a Ransomware-as-a-Service Model, Why Threat Intelligence in this Context is More Like Attribution""";50;03.06.2022;5
NetDiligence22;James Taliento;AFTRDRK;"""Breakout A: The Evolution of Ransomware & Its Impact on OFAC Compliance""";"""Applying OFAC Compliance Lessons from Non-Cyber Issues to Ransomware, Considering ""Risk Based"" Compliance When Dealing with Criminals, Application of OFAC's 50% Rule to a Ransomware-as-a-Service Model, Why Threat Intelligence in this Context is More Like Attribution""";50;03.06.2022;5
NetDiligence22;Brian Thornton;ProWriters Insurance;"""Breakout A: Cloud Based Incident Response""";"""Differences Between Traditional & Cloud-Based Incident Response, Threat Landscape as it Applies to the Cloud, Challenges with DFIR in the Cloud, Effective & Efficient Response to Cloud IR Matters""";50;03.06.2022;5
NetDiligence22;Ayesha West;Everest Insurance;"""Plenary: Why Talent Issues are a Bigger Threat than Ransomware""";"""Talent Market Overview, Causes for the Shortage of Talent, Impact on the Industry,, Best Practices for Acquisition, Development & Retention of Talent, How to Move the Industry Forward""";50;03.06.2022;5
NetDiligence22;Bradley Vatrt;AIG;"""Breakout B: Subrogation in Cyber Claims Related to Business Interruption & Contingent Business Interruption""";"""Infrastructure and Infrastructure Adjacent Vulnerabilities, Service Provider Outlook at Aggregative Claims, Service Level Agreement Implications, The Use of Models & Analytics to Identify Claims Opportunistic for Subrogation""";50;03.06.2022;4
Advisen22;Alex Jomaa;Tokio Marine Kiln;"""Underwriting’s Dramatic Overhaul""";"""Cyber underwriting has shifted significantly over the last 18 months. How effective are new modes of analyzing cyber risk? There’s been emphasis on outside-in scans pre-binding, but beyond monitoring, how has traditional underwriting evolved? How does the process impact coverage grants?""";45;11.05.2022;4
Advisen22;Marko Polunic;CrowdStrike;"""Underwriting’s Dramatic Overhaul""";"""Cyber underwriting has shifted significantly over the last 18 months. How effective are new modes of analyzing cyber risk? There’s been emphasis on outside-in scans pre-binding, but beyond monitoring, how has traditional underwriting evolved? How does the process impact coverage grants?""";45;11.05.2022;4
Advisen22;James Tuplin;Mosaic Insurance;"""Underwriting’s Dramatic Overhaul""";"""Cyber underwriting has shifted significantly over the last 18 months. How effective are new modes of analyzing cyber risk? There’s been emphasis on outside-in scans pre-binding, but beyond monitoring, how has traditional underwriting evolved? How does the process impact coverage grants?""";45;11.05.2022;4
Advisen22;Bethany Vohlers;SecurityScorecard;"""Underwriting’s Dramatic Overhaul""";"""Cyber underwriting has shifted significantly over the last 18 months. How effective are new modes of analyzing cyber risk? There’s been emphasis on outside-in scans pre-binding, but beyond monitoring, how has traditional underwriting evolved? How does the process impact coverage grants?""";45;11.05.2022;4
Advisen22;Allen Sattler;Lewis Brisbois;"""Where Are We on the Ransomware Journey?""";"""2021 brought a global focus on ransomware, with concerted public-private cooperation and high-profile arrests. What effect have these efforts had on the risks, response, and costs of ransomware? Has ransomware become a manageable threat or do cyber insurers expect continued evolution of the risk? We’ll offer statistics and insight on trends and changing threats.""";45;11.05.2022;5
Advisen22;Gillian Anderson;SCOR;"""Where Are We on the Ransomware Journey?""";"""2022 brought a global focus on ransomware, with concerted public-private cooperation and high-profile arrests. What effect have these efforts had on the risks, response, and costs of ransomware? Has ransomware become a manageable threat or do cyber insurers expect continued evolution of the risk? We’ll offer statistics and insight on trends and changing threats.""";45;11.05.2022;5
Advisen22;Evgueni Erchov;Arete;"""Where Are We on the Ransomware Journey?""";"""2023 brought a global focus on ransomware, with concerted public-private cooperation and high-profile arrests. What effect have these efforts had on the risks, response, and costs of ransomware? Has ransomware become a manageable threat or do cyber insurers expect continued evolution of the risk? We’ll offer statistics and insight on trends and changing threats.""";45;11.05.2022;5
Advisen22;Roger Francis;CFC Underwriting;"""Where Are We on the Ransomware Journey?""";"""2024 brought a global focus on ransomware, with concerted public-private cooperation and high-profile arrests. What effect have these efforts had on the risks, response, and costs of ransomware? Has ransomware become a manageable threat or do cyber insurers expect continued evolution of the risk? We’ll offer statistics and insight on trends and changing threats.""";45;11.05.2022;5
Advisen22;Jack Hughes;Unit 42 by Palo Alto;"""Where Are We on the Ransomware Journey?""";"""2025 brought a global focus on ransomware, with concerted public-private cooperation and high-profile arrests. What effect have these efforts had on the risks, response, and costs of ransomware? Has ransomware become a manageable threat or do cyber insurers expect continued evolution of the risk? We’ll offer statistics and insight on trends and changing threats.""";45;11.05.2022;5
Advisen22;Hans Allnutt;DAC Beachcroft ;"""Cross-Border Legal Considerations""";"""Cybercrime is an international business and events frequently involve multiple legal jurisdictions. Coordinating a global response means navigating different regulatory landscapes, different cyber insurance and risk trends and keeping pace with litigation. We’ll have legal perspectives from the UK, US, Australia, New Zealand, and Germany on this panel to offer insight for cyber insurance underwriters and claims professionals.""";45;11.05.2022;6
Advisen22;Kieran Doyle;Wotton & Kearney;"""Cross-Border Legal Considerations""";"""Cybercrime is an international business and events frequently involve multiple legal jurisdictions. Coordinating a global response means navigating different regulatory landscapes, different cyber insurance and risk trends and keeping pace with litigation. We’ll have legal perspectives from the UK, US, Australia, New Zealand, and Germany on this panel to offer insight for cyber insurance underwriters and claims professionals.""";45;11.05.2022;6
Advisen22;Joseph Fitzgerald;Wotton & Kearney;"""Cross-Border Legal Considerations""";"""Cybercrime is an international business and events frequently involve multiple legal jurisdictions. Coordinating a global response means navigating different regulatory landscapes, different cyber insurance and risk trends and keeping pace with litigation. We’ll have legal perspectives from the UK, US, Australia, New Zealand, and Germany on this panel to offer insight for cyber insurance underwriters and claims professionals.""";45;11.05.2022;6
Advisen22;Ellie Ludlam;DAC Beachcroft ;"""Cross-Border Legal Considerations""";"""Cybercrime is an international business and events frequently involve multiple legal jurisdictions. Coordinating a global response means navigating different regulatory landscapes, different cyber insurance and risk trends and keeping pace with litigation. We’ll have legal perspectives from the UK, US, Australia, New Zealand, and Germany on this panel to offer insight for cyber insurance underwriters and claims professionals.""";45;11.05.2022;6
Advisen22;Anjali Das;Wilson Elser;"""Cross-Border Legal Considerations""";"""Cybercrime is an international business and events frequently involve multiple legal jurisdictions. Coordinating a global response means navigating different regulatory landscapes, different cyber insurance and risk trends and keeping pace with litigation. We’ll have legal perspectives from the UK, US, Australia, New Zealand, and Germany on this panel to offer insight for cyber insurance underwriters and claims professionals.""";45;11.05.2022;6
Advisen22;Franz König;Bach / Langheid & Dallmayr;"""Cross-Border Legal Considerations""";"""Cybercrime is an international business and events frequently involve multiple legal jurisdictions. Coordinating a global response means navigating different regulatory landscapes, different cyber insurance and risk trends and keeping pace with litigation. We’ll have legal perspectives from the UK, US, Australia, New Zealand, and Germany on this panel to offer insight for cyber insurance underwriters and claims professionals.""";45;11.05.2022;6
Advisen22;Mike Sgarlata;Aon ;"""Cyber at Your Service: Refining Claims Response""";"""A silver lining of higher claims frequency and severity may be the opportunity for insurers and incident response firms to refine the claims process. Where have strides been made in containing costs and streamlining response? We’ll offer an update on advancements in claims strategies, compliance with international regulations, and best practices for filtering claims insights back to underwriting.""";45;11.05.2022;5
Advisen22;Anthony Hess;Asceris;"""Cyber at Your Service: Refining Claims Response""";"""A silver lining of higher claims frequency and severity may be the opportunity for insurers and incident response firms to refine the claims process. Where have strides been made in containing costs and streamlining response? We’ll offer an update on advancements in claims strategies, compliance with international regulations, and best practices for filtering claims insights back to underwriting.""";45;11.05.2022;5
Advisen22;Luke Johnson;Canopius;"""Cyber at Your Service: Refining Claims Response""";"""A silver lining of higher claims frequency and severity may be the opportunity for insurers and incident response firms to refine the claims process. Where have strides been made in containing costs and streamlining response? We’ll offer an update on advancements in claims strategies, compliance with international regulations, and best practices for filtering claims insights back to underwriting.""";45;11.05.2022;5
Advisen22;Bridget Quinn Choi;Tracepoint;"""Cyber at Your Service: Refining Claims Response""";"""A silver lining of higher claims frequency and severity may be the opportunity for insurers and incident response firms to refine the claims process. Where have strides been made in containing costs and streamlining response? We’ll offer an update on advancements in claims strategies, compliance with international regulations, and best practices for filtering claims insights back to underwriting.""";45;11.05.2022;5
Advisen22;Lindsay Nickle;Lewis Brisbois;"""Cyber at Your Service: Refining Claims Response""";"""A silver lining of higher claims frequency and severity may be the opportunity for insurers and incident response firms to refine the claims process. Where have strides been made in containing costs and streamlining response? We’ll offer an update on advancements in claims strategies, compliance with international regulations, and best practices for filtering claims insights back to underwriting.""";45;11.05.2022;5
Advisen22;Jacqueline Spencer-Sim;Hamilton ;"""Broker/Underwriter Roundtable: Is Cyber the New D&O?""";"""For corporate boards, managing cyber risk is now essential – is cyber coverage the new D&O as a necessary purchase?  What impact have higher prices and rigorous underwriting had on buyers’ insurance programs? Has cyber insurance remained a relevant purchase for buyers or has the hard market pushed coverage beyond many budgets? Do underwriting questions reflect cybersecurity realities for organizations? We’ll hear from key market players how strategies have changed.""";45;11.05.2022;5
Advisen22;Simon Basham;WTW;"""Broker/Underwriter Roundtable: Is Cyber the New D&O?""";"""For corporate boards, managing cyber risk is now essential – is cyber coverage the new D&O as a necessary purchase?  What impact have higher prices and rigorous underwriting had on buyers’ insurance programs? Has cyber insurance remained a relevant purchase for buyers or has the hard market pushed coverage beyond many budgets? Do underwriting questions reflect cybersecurity realities for organizations? We’ll hear from key market players how strategies have changed.""";45;11.05.2022;5
Advisen22;Corinne Hammond;AXIS Capital;"""Broker/Underwriter Roundtable: Is Cyber the New D&O?""";"""For corporate boards, managing cyber risk is now essential – is cyber coverage the new D&O as a necessary purchase?  What impact have higher prices and rigorous underwriting had on buyers’ insurance programs? Has cyber insurance remained a relevant purchase for buyers or has the hard market pushed coverage beyond many budgets? Do underwriting questions reflect cybersecurity realities for organizations? We’ll hear from key market players how strategies have changed.""";45;11.05.2022;5
Advisen22;Carlo Ramadoro;Lockton;"""Broker/Underwriter Roundtable: Is Cyber the New D&O?""";"""For corporate boards, managing cyber risk is now essential – is cyber coverage the new D&O as a necessary purchase?  What impact have higher prices and rigorous underwriting had on buyers’ insurance programs? Has cyber insurance remained a relevant purchase for buyers or has the hard market pushed coverage beyond many budgets? Do underwriting questions reflect cybersecurity realities for organizations? We’ll hear from key market players how strategies have changed.""";45;11.05.2022;5
Advisen22;Brian Warszona;Marsh;"""Broker/Underwriter Roundtable: Is Cyber the New D&O?""";"""For corporate boards, managing cyber risk is now essential – is cyber coverage the new D&O as a necessary purchase?  What impact have higher prices and rigorous underwriting had on buyers’ insurance programs? Has cyber insurance remained a relevant purchase for buyers or has the hard market pushed coverage beyond many budgets? Do underwriting questions reflect cybersecurity realities for organizations? We’ll hear from key market players how strategies have changed.""";45;11.05.2022;5
Advisen22;Siobhan O’Brien;Guy Carpenter;"""International Cyber Outlook: The Good News""";"""Cybersecurity and cyber insurance in 2022 aren’t for the faint of heart. There are, however, positive signs in the way the cyber insurance market is developing and collaborating with law enforcement around the world. Cyber insurance take-up and cybersecurity awareness also continue to rise. This session will offer some light at the end of the tunnel for the international cyber market.""";45;11.05.2022;6
Advisen22;Craig Dunn;Hiscox;"""International Cyber Outlook: The Good News""";"""Cybersecurity and cyber insurance in 2022 aren’t for the faint of heart. There are, however, positive signs in the way the cyber insurance market is developing and collaborating with law enforcement around the world. Cyber insurance take-up and cybersecurity awareness also continue to rise. This session will offer some light at the end of the tunnel for the international cyber market.""";45;11.05.2022;6
Advisen22;Alexandros Papdopoulos;Secureworks;"""International Cyber Outlook: The Good News""";"""Cybersecurity and cyber insurance in 2022 aren’t for the faint of heart. There are, however, positive signs in the way the cyber insurance market is developing and collaborating with law enforcement around the world. Cyber insurance take-up and cybersecurity awareness also continue to rise. This session will offer some light at the end of the tunnel for the international cyber market.""";45;11.05.2022;6
Advisen22;Raf Sanchez;Beazley;"""International Cyber Outlook: The Good News""";"""Cybersecurity and cyber insurance in 2022 aren’t for the faint of heart. There are, however, positive signs in the way the cyber insurance market is developing and collaborating with law enforcement around the world. Cyber insurance take-up and cybersecurity awareness also continue to rise. This session will offer some light at the end of the tunnel for the international cyber market.""";45;11.05.2022;6
Advisen22;Neil Arklie;Lloyd’s of London;"""International Cyber Outlook: The Good News""";"""Cybersecurity and cyber insurance in 2022 aren’t for the faint of heart. There are, however, positive signs in the way the cyber insurance market is developing and collaborating with law enforcement around the world. Cyber insurance take-up and cybersecurity awareness also continue to rise. This session will offer some light at the end of the tunnel for the international cyber market.""";45;11.05.2022;6
Advisen22;Oliver Brew;CyberCube;"""International Cyber Outlook: The Good News""";"""Cybersecurity and cyber insurance in 2022 aren’t for the faint of heart. There are, however, positive signs in the way the cyber insurance market is developing and collaborating with law enforcement around the world. Cyber insurance take-up and cybersecurity awareness also continue to rise. This session will offer some light at the end of the tunnel for the international cyber market.""";45;11.05.2022;6
NetDiligence21;April Doss;Georgetown University Law Center;"""Women in Cyber Luncheon""";"""Join us for one of our favorite traditions, meet new people and reconnect with old friends as we celebrate women in our industry! We look forward to hearing our keynote speaker, April Falcon Doss, Executive Director of the Georgetown Institute for Technology Law and Policy, a part Georgetown University's Tech and Society initiative, whose interdisciplinary programs educate lawyers, policymakers, and the public about the challenges arising emerging technologies and the ways that law and policy can adapt to address them. Hear her take on the cyber threat landscape, online disinformation, data privacy, and how to bridge the law-and-technology divide. Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr LLP.""";120;13.07.2021;3
NetDiligence21;Laurie Kamaiko;Saul Ewing Arnstein & Lehr LLP;"""Women in Cyber Luncheon""";"""Join us for one of our favorite traditions, meet new people and reconnect with old friends as we celebrate women in our industry! We look forward to hearing our keynote speaker, April Falcon Doss, Executive Director of the Georgetown Institute for Technology Law and Policy, a part Georgetown University's Tech and Society initiative, whose interdisciplinary programs educate lawyers, policymakers, and the public about the challenges arising emerging technologies and the ways that law and policy can adapt to address them. Hear her take on the cyber threat landscape, online disinformation, data privacy, and how to bridge the law-and-technology divide. Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr LLP.""";120;13.07.2021;3
NetDiligence21;Leigh McMullan;Crum & Forster;"""Women in Cyber Luncheon""";"""Join us for one of our favorite traditions, meet new people and reconnect with old friends as we celebrate women in our industry! We look forward to hearing our keynote speaker, April Falcon Doss, Executive Director of the Georgetown Institute for Technology Law and Policy, a part Georgetown University's Tech and Society initiative, whose interdisciplinary programs educate lawyers, policymakers, and the public about the challenges arising emerging technologies and the ways that law and policy can adapt to address them. Hear her take on the cyber threat landscape, online disinformation, data privacy, and how to bridge the law-and-technology divide. Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr LLP.""";120;13.07.2021;3
NetDiligence21;Ed Finn (M); Mullen Coughlin;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Elissa Doroff; Lockton;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Gina Greenwood; Nelson Mullins;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Meredith Griffanti; FTI Consulting;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Bill Hardin; Charles River Associates;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Ian Kelly; IDX;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Jae McKinney; Infiniqo;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Michael Nelson; Cybir;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Jonathan Rajewski; Stroz Friedberg;"""Interactive Business Interruption Scenario""";"""This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones""";90;13.07.2021;9
NetDiligence21;Vinny Sakore (M); NetDiligence;"""NetDiligence Ransomware Advisory Group Round-Up""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;13.07.2021;8
NetDiligence21;Devon Ackerman; Kroll;"""NetDiligence Ransomware Advisory Group Round-Up""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;13.07.2021;8
NetDiligence21;Jim Aldridge; MOXFIVE;"""NetDiligence Ransomware Advisory Group Round-Up""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;13.07.2021;8
NetDiligence21;Dave Chatfield; NetDiligence;"""NetDiligence Ransomware Advisory Group Round-Up""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;13.07.2021;8
NetDiligence21;Todd Doss; Ankura;"""NetDiligence Ransomware Advisory Group Round-Up""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;13.07.2021;8
NetDiligence21;Luke Emrich; Tetra Defense;"""NetDiligence Ransomware Advisory Group Round-Up""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;13.07.2021;8
NetDiligence21;Nathan Little; Tetra Defense;"""NetDiligence Ransomware Advisory Group Round-Up""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;13.07.2021;8
NetDiligence21;John Wood; Palo Alto Networks Unit 42;"""NetDiligence Ransomware Advisory Group Round-Up""";"""Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.""";90;13.07.2021;8
NetDiligence21;Evan Fenaroli (M); Philadelphia Insurance Companies;"""Blue: State of the Cyber Insurance Market""";"""Pricing and Controls Economic Impact on Projected Losses Consumer Perspective on Value of Cyber Insurance to Overall Risk Management Rise in InsureTech""";50;14.07.2021;5
NetDiligence21;John Anderson; Cyber Cube Analytics;"""Blue: State of the Cyber Insurance Market""";"""Pricing and Controls Economic Impact on Projected Losses Consumer Perspective on Value of Cyber Insurance to Overall Risk Management Rise in InsureTech""";50;14.07.2021;5
NetDiligence21;Nick Economidis; Crum & Forster;"""Blue: State of the Cyber Insurance Market""";"""Pricing and Controls Economic Impact on Projected Losses Consumer Perspective on Value of Cyber Insurance to Overall Risk Management Rise in InsureTech""";50;14.07.2021;5
NetDiligence21;Payal Patel; Marsh;"""Blue: State of the Cyber Insurance Market""";"""Pricing and Controls Economic Impact on Projected Losses Consumer Perspective on Value of Cyber Insurance to Overall Risk Management Rise in InsureTech""";50;14.07.2021;5
NetDiligence21;Catherine Rudow; Nationwide;"""Blue: State of the Cyber Insurance Market""";"""Pricing and Controls Economic Impact on Projected Losses Consumer Perspective on Value of Cyber Insurance to Overall Risk Management Rise in InsureTech""";50;14.07.2021;5
NetDiligence21;Rob Driscoll (M); Tracepoint;"""Grey: Life of a Ransomware Claim""";"""Variations Depending on Threat Actor & Variant Ransom settlement/Payment Regulatory Environment Payment Bans & Restrictions Business Interruption Considerations & Best Practices""";50;14.07.2021;5
NetDiligence21;Michael Bruemmer; Experian;"""Grey: Life of a Ransomware Claim""";"""Variations Depending on Threat Actor & Variant Ransom settlement/Payment Regulatory Environment Payment Bans & Restrictions Business Interruption Considerations & Best Practices""";50;14.07.2021;5
NetDiligence21;Marc Grens; Digital Mint;"""Grey: Life of a Ransomware Claim""";"""Variations Depending on Threat Actor & Variant Ransom settlement/Payment Regulatory Environment Payment Bans & Restrictions Business Interruption Considerations & Best Practices""";50;14.07.2021;5
NetDiligence21;Karen Painter Randall; Connell Foley;"""Grey: Life of a Ransomware Claim""";"""Variations Depending on Threat Actor & Variant Ransom settlement/Payment Regulatory Environment Payment Bans & Restrictions Business Interruption Considerations & Best Practices""";50;14.07.2021;5
NetDiligence21;Alexander Waintraub; Arete;"""Grey: Life of a Ransomware Claim""";"""Variations Depending on Threat Actor & Variant Ransom settlement/Payment Regulatory Environment Payment Bans & Restrictions Business Interruption Considerations & Best Practices""";50;14.07.2021;5
NetDiligence21;Richard Goldberg (M); Lewis Brisbois LLP;"""Blue: 2020 Claims & Losses Update""";"""A Review of the NetDiligence Cyber Claims Study Types of Claims Being Covered Examination of Cost""";50;14.07.2021;5
NetDiligence21;Jennifer Coughlin; Mullen Coughlin LLC;"""Blue: 2020 Claims & Losses Update""";"""A Review of the NetDiligence Cyber Claims Study Types of Claims Being Covered Examination of Cost""";50;14.07.2021;5
NetDiligence21;Mark Greisiger; NetDiligence;"""Blue: 2020 Claims & Losses Update""";"""A Review of the NetDiligence Cyber Claims Study Types of Claims Being Covered Examination of Cost""";50;14.07.2021;5
NetDiligence21;Elizabeth Neumann; AXIS Insurance;"""Blue: 2020 Claims & Losses Update""";"""A Review of the NetDiligence Cyber Claims Study Types of Claims Being Covered Examination of Cost""";50;14.07.2021;5
NetDiligence21;David Rock; Allied World;"""Blue: 2020 Claims & Losses Update""";"""A Review of the NetDiligence Cyber Claims Study Types of Claims Being Covered Examination of Cost""";50;14.07.2021;5
NetDiligence21;Ayesha West (M); Everest Insurance;"""Grey: Quantifying Risk in the Investigative Process""";"""Understanding the Forensics Investigation Process Impact of Overwriting Forensic Evidence Legal & Operational Impact of Ambiguity Regarding Data Exfiltration""";50;14.07.2021;5
NetDiligence21;John Barrett; BDP International;"""Grey: Quantifying Risk in the Investigative Process""";"""Understanding the Forensics Investigation Process Impact of Overwriting Forensic Evidence Legal & Operational Impact of Ambiguity Regarding Data Exfiltration""";50;14.07.2021;5
NetDiligence21;Sara Goldstein; BakerHostetler;"""Grey: Quantifying Risk in the Investigative Process""";"""Understanding the Forensics Investigation Process Impact of Overwriting Forensic Evidence Legal & Operational Impact of Ambiguity Regarding Data Exfiltration""";50;14.07.2021;5
NetDiligence21;Catherine Lyle; Coalition;"""Grey: Quantifying Risk in the Investigative Process""";"""Understanding the Forensics Investigation Process Impact of Overwriting Forensic Evidence Legal & Operational Impact of Ambiguity Regarding Data Exfiltration""";50;14.07.2021;5
NetDiligence21;Alan Sizemore; Ankura;"""Grey: Quantifying Risk in the Investigative Process""";"""Understanding the Forensics Investigation Process Impact of Overwriting Forensic Evidence Legal & Operational Impact of Ambiguity Regarding Data Exfiltration""";50;14.07.2021;5
NetDiligence21;Phil Yannella (M); Ballard Spahr LLP;"""Blue: US Regulatory and Privacy Litigation Update""";"""Regulatory Updates Recent Developments in Data Breach & Privacy Litigation""";30;14.07.2021;5
NetDiligence21;Sadia Mirza; Troutman Pepper LLP;"""Blue: US Regulatory and Privacy Litigation Update""";"""Regulatory Updates Recent Developments in Data Breach & Privacy Litigation""";30;14.07.2021;5
NetDiligence21;Joshua A. Mooney; Kennedys;"""Blue: US Regulatory and Privacy Litigation Update""";"""Regulatory Updates Recent Developments in Data Breach & Privacy Litigation""";30;14.07.2021;5
NetDiligence21;Carrie Parikh; Horizon Blue Cross Blue Shield;"""Blue: US Regulatory and Privacy Litigation Update""";"""Regulatory Updates Recent Developments in Data Breach & Privacy Litigation""";30;14.07.2021;5
NetDiligence21;Eve-Lynn Rapp; Edelson;"""Blue: US Regulatory and Privacy Litigation Update""";"""Regulatory Updates Recent Developments in Data Breach & Privacy Litigation""";30;14.07.2021;5
NetDiligence21;James Giszczak (M); McDonald Hopkins;"""Grey: Post Breach Restoration & Recovery""";"""Financial Considerations Insurance Coverage Betterment Double Ransom Reputational Harm""";30;14.07.2021;5
NetDiligence21;Kimberly Holmes; Perez Morris;"""Grey: Post Breach Restoration & Recovery""";"""Financial Considerations Insurance Coverage Betterment Double Ransom Reputational Harm""";30;14.07.2021;5
NetDiligence21;Anahi Santiago; ChristianaCare Health System;"""Grey: Post Breach Restoration & Recovery""";"""Financial Considerations Insurance Coverage Betterment Double Ransom Reputational Harm""";30;14.07.2021;5
NetDiligence21;Richard Sheridan; Berkley Cyber Risk Solutions;"""Grey: Post Breach Restoration & Recovery""";"""Financial Considerations Insurance Coverage Betterment Double Ransom Reputational Harm""";30;14.07.2021;5
NetDiligence21;Jonathan Tock; SpearTip;"""Grey: Post Breach Restoration & Recovery""";"""Financial Considerations Insurance Coverage Betterment Double Ransom Reputational Harm""";30;14.07.2021;5
NetDiligence21;Jana Eggers;Nara Logics;"""Lunch""";"""Join us for lunch and our keynote speaker, Jana Eggers, CEO of Nara Logics, a neuroscience-inspired, artificial intelligence platform company.  Hear her take on AI and leading edge technologies--their current impact and applicability, as well as what the future might hold. Lunch is sponsored by Consilio.""";90;14.07.2021;1
NetDiligence21;Erin Burns (M); INSUREtrust;"""Blue: Improving Data Visibility for Better Underwriting and Coverage""";"""Predicting Probability and Severity of Events Need for Better Data Collection Standards Lifecycle of Data Examination of Forms""";50;14.07.2021;5
NetDiligence21;Lewis Guignard; Guidewire;"""Blue: Improving Data Visibility for Better Underwriting and Coverage""";"""Predicting Probability and Severity of Events Need for Better Data Collection Standards Lifecycle of Data Examination of Forms""";50;14.07.2021;5
NetDiligence21;Ann Irvine; Resilience;"""Blue: Improving Data Visibility for Better Underwriting and Coverage""";"""Predicting Probability and Severity of Events Need for Better Data Collection Standards Lifecycle of Data Examination of Forms""";50;14.07.2021;5
NetDiligence21;Robert Rosenzweig; Risk Strategies;"""Blue: Improving Data Visibility for Better Underwriting and Coverage""";"""Predicting Probability and Severity of Events Need for Better Data Collection Standards Lifecycle of Data Examination of Forms""";50;14.07.2021;5
NetDiligence21;Reuben Vandeventer; SecondSight;"""Blue: Improving Data Visibility for Better Underwriting and Coverage""";"""Predicting Probability and Severity of Events Need for Better Data Collection Standards Lifecycle of Data Examination of Forms""";50;14.07.2021;5
NetDiligence21;Spencer Timmel (M); Safety National;"""Grey: Mechanics of Adjusting a Business Interruption Claim""";"""The Steps in Evaluating & Calculating the Loss Putting Proactive Practices in Place Coverage Wording Mitigating BI Exposure""";50;14.07.2021;5
NetDiligence21;Harriet Bateman; Baker Tilly;"""Grey: Mechanics of Adjusting a Business Interruption Claim""";"""The Steps in Evaluating & Calculating the Loss Putting Proactive Practices in Place Coverage Wording Mitigating BI Exposure""";50;14.07.2021;5
NetDiligence21;Allen Burzen; GBMS USA;"""Grey: Mechanics of Adjusting a Business Interruption Claim""";"""The Steps in Evaluating & Calculating the Loss Putting Proactive Practices in Place Coverage Wording Mitigating BI Exposure""";50;14.07.2021;5
NetDiligence21;Jeremy Gittler; AXA XL;"""Grey: Mechanics of Adjusting a Business Interruption Claim""";"""The Steps in Evaluating & Calculating the Loss Putting Proactive Practices in Place Coverage Wording Mitigating BI Exposure""";50;14.07.2021;5
NetDiligence21;Laurie Kamaiko;Saul Ewing Arnstein & Lehr LLP;"""Grey: Mechanics of Adjusting a Business Interruption Claim""";"""The Steps in Evaluating & Calculating the Loss Putting Proactive Practices in Place Coverage Wording Mitigating BI Exposure""";50;14.07.2021;5
NetDiligence21;Drew Walter (M); Ascot Group;"""Blue: Leveraging & Understanding Policyholder Scans""";"""Preparing the Policyholder for Application or Renewal Walkthrough of a Scan and Report Underwriter Use of Scans Role of the Broker Future Use of Technology in Underwriting""";50;14.07.2021;5
NetDiligence21;Dave Lewison; Amwins;"""Blue: Leveraging & Understanding Policyholder Scans""";"""Preparing the Policyholder for Application or Renewal Walkthrough of a Scan and Report Underwriter Use of Scans Role of the Broker Future Use of Technology in Underwriting""";50;14.07.2021;5
NetDiligence21;Chris Poulin; Bitsight;"""Blue: Leveraging & Understanding Policyholder Scans""";"""Preparing the Policyholder for Application or Renewal Walkthrough of a Scan and Report Underwriter Use of Scans Role of the Broker Future Use of Technology in Underwriting""";50;14.07.2021;5
NetDiligence21;Patrick Thielen; Chubb;"""Blue: Leveraging & Understanding Policyholder Scans""";"""Preparing the Policyholder for Application or Renewal Walkthrough of a Scan and Report Underwriter Use of Scans Role of the Broker Future Use of Technology in Underwriting""";50;14.07.2021;5
NetDiligence21;Lauren Winchester; Corvus Insurance;"""Blue: Leveraging & Understanding Policyholder Scans""";"""Preparing the Policyholder for Application or Renewal Walkthrough of a Scan and Report Underwriter Use of Scans Role of the Broker Future Use of Technology in Underwriting""";50;14.07.2021;5
NetDiligence21;Brian Robb (M);Berkshire Hathaway Specialty Insurance;"""Grey: International Regulatory Compliance & Breach Response""";"""Overview of New International Regulations International Breach Response Planning and Execution Best Practices""";50;14.07.2021;5
NetDiligence21;Anthony Dolce; The Hartford;"""Grey: International Regulatory Compliance & Breach Response""";"""Overview of New International Regulations International Breach Response Planning and Execution Best Practices""";50;14.07.2021;5
NetDiligence21;James Jansen; Consilio;"""Grey: International Regulatory Compliance & Breach Response""";"""Overview of New International Regulations International Breach Response Planning and Execution Best Practices""";50;14.07.2021;5
NetDiligence21;Domenic Paci; Equifax;"""Grey: International Regulatory Compliance & Breach Response""";"""Overview of New International Regulations International Breach Response Planning and Execution Best Practices""";50;14.07.2021;5
NetDiligence21;Bruce Radke; Polsinelli PC;"""Grey: International Regulatory Compliance & Breach Response""";"""Overview of New International Regulations International Breach Response Planning and Execution Best Practices""";50;14.07.2021;5
NetDiligence21;Jennifer Beckage (M); Beckage;"""Blue: Emerging Technology Risks""";"""Overview of Emerging Technology & Definitions Data Science & Implementation Risk Management Implications""";50;14.07.2021;5
NetDiligence21;Kelly Castriotta; Markel;"""Blue: Emerging Technology Risks""";"""Overview of Emerging Technology & Definitions Data Science & Implementation Risk Management Implications""";50;14.07.2021;5
NetDiligence21;Jazmin Furtado; U.S. Space Force;"""Blue: Emerging Technology Risks""";"""Overview of Emerging Technology & Definitions Data Science & Implementation Risk Management Implications""";50;14.07.2021;5
NetDiligence21;Kimberly Pack; Anheuser-Busch;"""Blue: Emerging Technology Risks""";"""Overview of Emerging Technology & Definitions Data Science & Implementation Risk Management Implications""";50;14.07.2021;5
NetDiligence21;Neeraj Sahni; Aon;"""Blue: Emerging Technology Risks""";"""Overview of Emerging Technology & Definitions Data Science & Implementation Risk Management Implications""";50;14.07.2021;5
NetDiligence21;John Loyal (M); Cipriani & Werner PC;"""Grey: Biometric Regulatory Updates & Coverage Considerations""";"""Regulatory Requirements & Triggers Developing Legislation and Impact on Businesses Examples of Post-Covid Litigation Future Biometric Legislation and Liability Collaboration Between Lines""";50;14.07.2021;5
NetDiligence21;Meghan Hannes; Beazley;"""Grey: Biometric Regulatory Updates & Coverage Considerations""";"""Regulatory Requirements & Triggers Developing Legislation and Impact on Businesses Examples of Post-Covid Litigation Future Biometric Legislation and Liability Collaboration Between Lines""";50;14.07.2021;5
NetDiligence21;Julia Jacobson; Arent Fox;"""Grey: Biometric Regulatory Updates & Coverage Considerations""";"""Regulatory Requirements & Triggers Developing Legislation and Impact on Businesses Examples of Post-Covid Litigation Future Biometric Legislation and Liability Collaboration Between Lines""";50;14.07.2021;5
NetDiligence21;Gamelah Palagonia; Willis Towers Watson;"""Grey: Biometric Regulatory Updates & Coverage Considerations""";"""Regulatory Requirements & Triggers Developing Legislation and Impact on Businesses Examples of Post-Covid Litigation Future Biometric Legislation and Liability Collaboration Between Lines""";50;14.07.2021;5
NetDiligence21;Becky Swanson; Hudson Insurance Group;"""Grey: Biometric Regulatory Updates & Coverage Considerations""";"""Regulatory Requirements & Triggers Developing Legislation and Impact on Businesses Examples of Post-Covid Litigation Future Biometric Legislation and Liability Collaboration Between Lines""";50;14.07.2021;5
NetDiligence20;Paige Hanson (M); NortonLifeLock;"""Cyber Smart""";"""This live streaming event features cyber security expert, business investor, and former bank robber Jim Stickley. Hear about the risks individuals are facing on a daily basis. Find out about the latest cyber-attacks and threats that organizations are confronting and how Jim finds security flaws before the real criminals can and warns people and organizations about steps they can take to protect themselves.""";60;24.06.2020;2
NetDiligence20;Jim Stickley; Stickley on Security;"""Cyber Smart""";"""This live streaming event features cyber security expert, business investor, and former bank robber Jim Stickley. Hear about the risks individuals are facing on a daily basis. Find out about the latest cyber-attacks and threats that organizations are confronting and how Jim finds security flaws before the real criminals can and warns people and organizations about steps they can take to protect themselves.""";60;24.06.2020;2
NetDiligence20;John Coletti (M); Swiss Re;"""Fireside Chat: State of the Market""";"""An informal conversation about current trends in the market.""";60;30.06.2020;4
NetDiligence20;Nick Economidis; Crum & Forster;"""Fireside Chat: State of the Market""";"""An informal conversation about current trends in the market.""";60;30.06.2020;4
NetDiligence20;Shannon Groeber; CFC;"""Fireside Chat: State of the Market""";"""An informal conversation about current trends in the market.""";60;30.06.2020;4
NetDiligence20;Dan Trueman; AXIS Insurance;"""Fireside Chat: State of the Market""";"""An informal conversation about current trends in the market.""";60;30.06.2020;4
NetDiligence20;Simon Oddy (M); Baker Tilly;"""Claims and Losses""";"""A Preview of the 2020 Findings of the NetDiligence Claims Study Trends and Costs Non-Affirmative Claims on the Rise Threats of Aggregation Top Policyholder Mistakes That Drive Up Costs""";60;30.06.2020;5
NetDiligence20;Jennifer Coughlin; Mullen Coughlin LLC;"""Claims and Losses""";"""A Preview of the 2020 Findings of the NetDiligence Claims Study Trends and Costs Non-Affirmative Claims on the Rise Threats of Aggregation Top Policyholder Mistakes That Drive Up Costs""";60;30.06.2020;5
NetDiligence20;Mark Greisiger; NetDiligence;"""Claims and Losses""";"""A Preview of the 2020 Findings of the NetDiligence Claims Study Trends and Costs Non-Affirmative Claims on the Rise Threats of Aggregation Top Policyholder Mistakes That Drive Up Costs""";60;30.06.2020;5
NetDiligence20;Joe Niemczyk; Markel;"""Claims and Losses""";"""A Preview of the 2020 Findings of the NetDiligence Claims Study Trends and Costs Non-Affirmative Claims on the Rise Threats of Aggregation Top Policyholder Mistakes That Drive Up Costs""";60;30.06.2020;5
NetDiligence20;Marissa Olsen; Aspen Insurance;"""Claims and Losses""";"""A Preview of the 2020 Findings of the NetDiligence Claims Study Trends and Costs Non-Affirmative Claims on the Rise Threats of Aggregation Top Policyholder Mistakes That Drive Up Costs""";60;30.06.2020;5
NetDiligence20;John Farley (M); Gallagher;"""What is Remedy and What is Improvement?""";"""Disagreement Between Carrier and Forensics Betterment Coverage CCPA ""Cure"" Simply Fending Off Lawsuits v. Better Security Posture""";60;30.06.2020;4
NetDiligence20;Sean Curran; West Monroe Partners;"""What is Remedy and What is Improvement?""";"""Disagreement Between Carrier and Forensics Betterment Coverage CCPA ""Cure"" Simply Fending Off Lawsuits v. Better Security Posture""";60;30.06.2020;4
NetDiligence20;Tim Francis; Travelers;"""What is Remedy and What is Improvement?""";"""Disagreement Between Carrier and Forensics Betterment Coverage CCPA ""Cure"" Simply Fending Off Lawsuits v. Better Security Posture""";60;30.06.2020;4
NetDiligence20;Ronald Raether; Troutman Pepper;"""What is Remedy and What is Improvement?""";"""Disagreement Between Carrier and Forensics Betterment Coverage CCPA ""Cure"" Simply Fending Off Lawsuits v. Better Security Posture""";60;30.06.2020;4
NetDiligence20;Erica Davis (M); Guy Carpenter;"""Cyber War and Terrorism""";"""Territorial Consideration Nature of State Sponsored Attacks Challenges in Attribution Coverage Provisons""";60;30.06.2020;5
NetDiligence20;Cyrus Delarami; Munich Re;"""Cyber War and Terrorism""";"""Territorial Consideration Nature of State Sponsored Attacks Challenges in Attribution Coverage Provisons""";60;30.06.2020;5
NetDiligence20;Wendy Peters; Willis Towers Watson;"""Cyber War and Terrorism""";"""Territorial Consideration Nature of State Sponsored Attacks Challenges in Attribution Coverage Provisons""";60;30.06.2020;5
NetDiligence20;Matthew Prevost; Chubb;"""Cyber War and Terrorism""";"""Territorial Consideration Nature of State Sponsored Attacks Challenges in Attribution Coverage Provisons""";60;30.06.2020;5
NetDiligence20;Keith Wojcieszek; Kroll;"""Cyber War and Terrorism""";"""Territorial Consideration Nature of State Sponsored Attacks Challenges in Attribution Coverage Provisons""";60;30.06.2020;5
NetDiligence20;Robert Parisi (M); Munich Re;"""Non-Affirmative Cyber""";"""Definitions Non-Affirmative Impact in Non-Cyber Lines Coverage Considerations Product Development and Solutions""";60;30.06.2020;4
NetDiligence20;Scott Godes; Barnes & Thornburg LLP;"""Non-Affirmative Cyber""";"""Definitions Non-Affirmative Impact in Non-Cyber Lines Coverage Considerations Product Development and Solutions""";60;30.06.2020;4
NetDiligence20;Michael Hauner; Munich Re;"""Non-Affirmative Cyber""";"""Definitions Non-Affirmative Impact in Non-Cyber Lines Coverage Considerations Product Development and Solutions""";60;30.06.2020;4
NetDiligence20;Max Perkins; AXIS Insurance;"""Non-Affirmative Cyber""";"""Definitions Non-Affirmative Impact in Non-Cyber Lines Coverage Considerations Product Development and Solutions""";60;30.06.2020;4
NetDiligence20;Richard DePiero (M); Sompo International;"""Systemic Risk & Aggregation""";"""Discussion of Different Models, Modeling Approach, and Intended Use Cases Interpreting Results & Using Modeling Insights Accounting for New Exposures, Fines & Penalties, Ransomware Aggregation""";60;30.06.2020;5
NetDiligence20;Kelly Castriotta; Markel;"""Systemic Risk & Aggregation""";"""Discussion of Different Models, Modeling Approach, and Intended Use Cases Interpreting Results & Using Modeling Insights Accounting for New Exposures, Fines & Penalties, Ransomware Aggregation""";60;30.06.2020;5
NetDiligence20;Yakir Golan; Kovrr;"""Systemic Risk & Aggregation""";"""Discussion of Different Models, Modeling Approach, and Intended Use Cases Interpreting Results & Using Modeling Insights Accounting for New Exposures, Fines & Penalties, Ransomware Aggregation""";60;30.06.2020;5
NetDiligence20;Danielle Smith; RMS;"""Systemic Risk & Aggregation""";"""Discussion of Different Models, Modeling Approach, and Intended Use Cases Interpreting Results & Using Modeling Insights Accounting for New Exposures, Fines & Penalties, Ransomware Aggregation""";60;30.06.2020;5
NetDiligence20;Emma Watkins; Lloyd's;"""Systemic Risk & Aggregation""";"""Discussion of Different Models, Modeling Approach, and Intended Use Cases Interpreting Results & Using Modeling Insights Accounting for New Exposures, Fines & Penalties, Ransomware Aggregation""";60;30.06.2020;5
NetDiligence20;Richard Goldberg (M); Lewis Brisbois LLP;"""Evolution of Ransomware Claims""";"""Trends: Frequency & Costs Impact of Covid-19 Coverage Response: Negotiations and Payment Potential BI Losses if No-Pay""";60;01.07.2020;5
NetDiligence20;Ben Auton; SpearTip;"""Evolution of Ransomware Claims""";"""Trends: Frequency & Costs Impact of Covid-19 Coverage Response: Negotiations and Payment Potential BI Losses if No-Pay""";60;01.07.2020;5
NetDiligence20;Kimberly Horn; Beazley;"""Evolution of Ransomware Claims""";"""Trends: Frequency & Costs Impact of Covid-19 Coverage Response: Negotiations and Payment Potential BI Losses if No-Pay""";60;01.07.2020;5
NetDiligence20;Bill Siegel; Coveware;"""Evolution of Ransomware Claims""";"""Trends: Frequency & Costs Impact of Covid-19 Coverage Response: Negotiations and Payment Potential BI Losses if No-Pay""";60;01.07.2020;5
NetDiligence20;Matthew Webb; Hiscox;"""Evolution of Ransomware Claims""";"""Trends: Frequency & Costs Impact of Covid-19 Coverage Response: Negotiations and Payment Potential BI Losses if No-Pay""";60;01.07.2020;5
NetDiligence20;Daniel Tobok (M); Cypfer;"""Business Email Compromise and Wire Fraud""";"""Different Types of Wire Fraud: Social Engineering and Email Hacking Types and Ramifications of Social Engineering Types and Ramifications of Email Hacking Costs Associated with Social Engineering and Hacking""";60;01.07.2020;5
NetDiligence20;Matt Gayford; Crypsis Group;"""Business Email Compromise and Wire Fraud""";"""Different Types of Wire Fraud: Social Engineering and Email Hacking Types and Ramifications of Social Engineering Types and Ramifications of Email Hacking Costs Associated with Social Engineering and Hacking""";60;01.07.2020;5
NetDiligence20;Erika Nelson; Allied World;"""Business Email Compromise and Wire Fraud""";"""Different Types of Wire Fraud: Social Engineering and Email Hacking Types and Ramifications of Social Engineering Types and Ramifications of Email Hacking Costs Associated with Social Engineering and Hacking""";60;01.07.2020;5
NetDiligence20;Stephen Ramey; Arete;"""Business Email Compromise and Wire Fraud""";"""Different Types of Wire Fraud: Social Engineering and Email Hacking Types and Ramifications of Social Engineering Types and Ramifications of Email Hacking Costs Associated with Social Engineering and Hacking""";60;01.07.2020;5
NetDiligence20;Karen Painter Randall; Connell Foley;"""Business Email Compromise and Wire Fraud""";"""Different Types of Wire Fraud: Social Engineering and Email Hacking Types and Ramifications of Social Engineering Types and Ramifications of Email Hacking Costs Associated with Social Engineering and Hacking""";60;01.07.2020;5
NetDiligence20;Drew Walter (M); Ascot Group;"""SME: Moving to a Pro-Active World""";"""How are Placements Done Assessing the SME Efficiencies Striving to Differentiate Role of Insure Tech & the Investor Perspective""";60;01.07.2020;4
NetDiligence20;Sam Kassoumeh; SecurityScorecard;"""SME: Moving to a Pro-Active World""";"""How are Placements Done Assessing the SME Efficiencies Striving to Differentiate Role of Insure Tech & the Investor Perspective""";60;01.07.2020;4
NetDiligence20;Lauren Tennant Pollock; AXA XL;"""SME: Moving to a Pro-Active World""";"""How are Placements Done Assessing the SME Efficiencies Striving to Differentiate Role of Insure Tech & the Investor Perspective""";60;01.07.2020;4
NetDiligence20;Robert Rosenzweig; Risk Strategies;"""SME: Moving to a Pro-Active World""";"""How are Placements Done Assessing the SME Efficiencies Striving to Differentiate Role of Insure Tech & the Investor Perspective""";60;01.07.2020;4
NetDiligence20;Mark Mao (M); Boies Schiller Flexner LLP;"""Wrongful Use and Inadequate Disclosure""";"""Hazards of Insuring Deliberate Business Practices that Run Afoul of New Regulations Rewording Coverage to Avoid Expanded Exposures Pricing for Expanded Exposures Impact on Profitablity by Next Wave of Class Actions and Regulatory Investigations""";60;01.07.2020;5
NetDiligence20;Laurie Kamaiko; Saul Ewing Arnstein & Lehr LLP;"""Wrongful Use and Inadequate Disclosure""";"""Hazards of Insuring Deliberate Business Practices that Run Afoul of New Regulations Rewording Coverage to Avoid Expanded Exposures Pricing for Expanded Exposures Impact on Profitablity by Next Wave of Class Actions and Regulatory Investigations""";60;01.07.2020;5
NetDiligence20;Chris Keegan; Beecher Carlson;"""Wrongful Use and Inadequate Disclosure""";"""Hazards of Insuring Deliberate Business Practices that Run Afoul of New Regulations Rewording Coverage to Avoid Expanded Exposures Pricing for Expanded Exposures Impact on Profitablity by Next Wave of Class Actions and Regulatory Investigations""";60;01.07.2020;5
NetDiligence20;Richard Sheridan; Berkley Cyber Risk Solutions;"""Wrongful Use and Inadequate Disclosure""";"""Hazards of Insuring Deliberate Business Practices that Run Afoul of New Regulations Rewording Coverage to Avoid Expanded Exposures Pricing for Expanded Exposures Impact on Profitablity by Next Wave of Class Actions and Regulatory Investigations""";60;01.07.2020;5
NetDiligence20;John Yanchunis; Morgan & Morgan;"""Wrongful Use and Inadequate Disclosure""";"""Hazards of Insuring Deliberate Business Practices that Run Afoul of New Regulations Rewording Coverage to Avoid Expanded Exposures Pricing for Expanded Exposures Impact on Profitablity by Next Wave of Class Actions and Regulatory Investigations""";60;01.07.2020;5
NetDiligence20;Stu Panensky (M); FisherBroyles LLP;"""Tricky Breaches: Managed Service Providers""";"""Duty of Care Forensics Complications Downstream Implications Conflicts Between Carriers Issues of Subrogation""";60;01.07.2020;5
NetDiligence20;Meghan Hannes; Beazley;"""Tricky Breaches: Managed Service Providers""";"""Duty of Care Forensics Complications Downstream Implications Conflicts Between Carriers Issues of Subrogation""";60;01.07.2020;5
NetDiligence20;Brendan Kelley; CNA;"""Tricky Breaches: Managed Service Providers""";"""Duty of Care Forensics Complications Downstream Implications Conflicts Between Carriers Issues of Subrogation""";60;01.07.2020;5
NetDiligence20;Nathan Little; Tetra Defense;"""Tricky Breaches: Managed Service Providers""";"""Duty of Care Forensics Complications Downstream Implications Conflicts Between Carriers Issues of Subrogation""";60;01.07.2020;5
NetDiligence20;David Walton; Cozen O'Connor;"""Tricky Breaches: Managed Service Providers""";"""Duty of Care Forensics Complications Downstream Implications Conflicts Between Carriers Issues of Subrogation""";60;01.07.2020;5
NetDiligence20;Joshua A. Mooney (M); Kennedys;"""Building A Compliance Program Without Breaking the Bank""";"""Sources to Define a Reasonable Cybersecurity Program Organizationalizing the Mitigation of Internal and External Risks Managing Risk in the Data Flow Training and the USE of MSP Security Services""";60;07.07.2020;4
NetDiligence20;Steve Greenawalt; Cybir;"""Building A Compliance Program Without Breaking the Bank""";"""Sources to Define a Reasonable Cybersecurity Program Organizationalizing the Mitigation of Internal and External Risks Managing Risk in the Data Flow Training and the USE of MSP Security Services""";60;07.07.2020;4
NetDiligence20;Elizabeth Hinkle; 2U;"""Building A Compliance Program Without Breaking the Bank""";"""Sources to Define a Reasonable Cybersecurity Program Organizationalizing the Mitigation of Internal and External Risks Managing Risk in the Data Flow Training and the USE of MSP Security Services""";60;07.07.2020;4
NetDiligence20;Kerry Manaster; Cloud Security Alliance;"""Building A Compliance Program Without Breaking the Bank""";"""Sources to Define a Reasonable Cybersecurity Program Organizationalizing the Mitigation of Internal and External Risks Managing Risk in the Data Flow Training and the USE of MSP Security Services""";60;07.07.2020;4
NetDiligence20;Andrew Maher (M);AXIS Insurance;"""What is Reasonable Cyber Security?""";"""Terms and Definitons Various Standards of Reasonableness and Duty of Care Risk-Based Analysis and Best Practices Communicating to and Working with the Policyholder""";60;07.07.2020;4
NetDiligence20;Chris Cronin; Halock Security Labs;"""What is Reasonable Cyber Security?""";"""Terms and Definitons Various Standards of Reasonableness and Duty of Care Risk-Based Analysis and Best Practices Communicating to and Working with the Policyholder""";60;07.07.2020;4
NetDiligence20;Doug Meal; Orrick LLP;"""What is Reasonable Cyber Security?""";"""Terms and Definitons Various Standards of Reasonableness and Duty of Care Risk-Based Analysis and Best Practices Communicating to and Working with the Policyholder""";60;07.07.2020;4
NetDiligence20;Timothy Murphy;Office of Attorney General for the Commonwealth of Pennsylvania;"""What is Reasonable Cyber Security?""";"""Terms and Definitons Various Standards of Reasonableness and Duty of Care Risk-Based Analysis and Best Practices Communicating to and Working with the Policyholder""";60;07.07.2020;4
NetDiligence20;Kara Owens (M); Markel;"""Digital Risk Management""";"""Trends Impacting Digital Risk Management Challenges Facing the Policyholder Supporting Better Digital Risk Management Future Expectations""";60;07.07.2020;4
NetDiligence20;Nickolas Graf; CNA;"""Digital Risk Management""";"""Trends Impacting Digital Risk Management Challenges Facing the Policyholder Supporting Better Digital Risk Management Future Expectations""";60;07.07.2020;4
NetDiligence20;Sarah Kahler; RSA;"""Digital Risk Management""";"""Trends Impacting Digital Risk Management Challenges Facing the Policyholder Supporting Better Digital Risk Management Future Expectations""";60;07.07.2020;4
NetDiligence20;Andreas Kaltsounis;Baker Hostetler LLP;"""Digital Risk Management""";"""Trends Impacting Digital Risk Management Challenges Facing the Policyholder Supporting Better Digital Risk Management Future Expectations""";60;07.07.2020;4
NetDiligence20;Spencer Timmel (M); Safety National;"""Predicting a Breach""";"""Examination of Forms Questions Asked v Their Actual Value in Assessment Can Scoring Help?""";60;21.07.2020;5
NetDiligence20;Manish Karir; FICO;"""Predicting a Breach""";"""Examination of Forms Questions Asked v Their Actual Value in Assessment Can Scoring Help?""";60;21.07.2020;5
NetDiligence20;Tim Nunziata; Nationwide;"""Predicting a Breach""";"""Examination of Forms Questions Asked v Their Actual Value in Assessment Can Scoring Help?""";60;21.07.2020;5
NetDiligence20;Payal Patel; Marsh;"""Predicting a Breach""";"""Examination of Forms Questions Asked v Their Actual Value in Assessment Can Scoring Help?""";60;21.07.2020;5
NetDiligence20;James Perry; CrowdStrike;"""Predicting a Breach""";"""Examination of Forms Questions Asked v Their Actual Value in Assessment Can Scoring Help?""";60;21.07.2020;5
NetDiligence20;Tony Kriesel (M); Hiscox London Market;"""Cyber Claims Handling Best Practices""";"""Pre-Incident Preparation Initial Incident Response Effective Handling of a Ransomware Event Cyber Business interruption""";60;21.07.2020;4
NetDiligence20;Harriet Bateman; Baker Tilly;"""Cyber Claims Handling Best Practices""";"""Pre-Incident Preparation Initial Incident Response Effective Handling of a Ransomware Event Cyber Business interruption""";60;21.07.2020;4
NetDiligence20;Elizabeth Dill; Lewis Brisbois;"""Cyber Claims Handling Best Practices""";"""Pre-Incident Preparation Initial Incident Response Effective Handling of a Ransomware Event Cyber Business interruption""";60;21.07.2020;4
NetDiligence20;Matthew Tucci; Sompo International;"""Cyber Claims Handling Best Practices""";"""Pre-Incident Preparation Initial Incident Response Effective Handling of a Ransomware Event Cyber Business interruption""";60;21.07.2020;4
NetDiligence20;David Molitano (M); Berkley Cyber Risk Solutions;"""Crisis Communications, PR and Reputational Harm""";"""Protecting Brand & Reputation Balancing Legal Risk with Regulatory Disclosure Requirements Scrutiny on Impacted Business Post-Breach and Notification Insurance Coverage: Availability, Triggers, Valuation""";60;21.07.2020;5
NetDiligence20;Sandra Bernardo; Experian;"""Crisis Communications, PR and Reputational Harm""";"""Protecting Brand & Reputation Balancing Legal Risk with Regulatory Disclosure Requirements Scrutiny on Impacted Business Post-Breach and Notification Insurance Coverage: Availability, Triggers, Valuation""";60;21.07.2020;5
NetDiligence20;Kimberly Holmes; Perez Morris;"""Crisis Communications, PR and Reputational Harm""";"""Protecting Brand & Reputation Balancing Legal Risk with Regulatory Disclosure Requirements Scrutiny on Impacted Business Post-Breach and Notification Insurance Coverage: Availability, Triggers, Valuation""";60;21.07.2020;5
NetDiligence20;Jamie Singer; FTI Consulting;"""Crisis Communications, PR and Reputational Harm""";"""Protecting Brand & Reputation Balancing Legal Risk with Regulatory Disclosure Requirements Scrutiny on Impacted Business Post-Breach and Notification Insurance Coverage: Availability, Triggers, Valuation""";60;21.07.2020;5
NetDiligence20;Jena Valdetero; Bryan Cave Leighton Paisner LLP;"""Crisis Communications, PR and Reputational Harm""";"""Protecting Brand & Reputation Balancing Legal Risk with Regulatory Disclosure Requirements Scrutiny on Impacted Business Post-Breach and Notification Insurance Coverage: Availability, Triggers, Valuation""";60;21.07.2020;5
NetDiligence20;Brian Thornton (M); ProWriters;"""SME: Pricing and Terms""";"""The Evolution of Coverage for the SME Sub-Limited Coverage Assessing the SME""";60;04.08.2020;4
NetDiligence20;Jonelle Horta; Allied World;"""SME: Pricing and Terms""";"""The Evolution of Coverage for the SME Sub-Limited Coverage Assessing the SME""";60;04.08.2020;4
NetDiligence20;Dave Lewison; Amwins;"""SME: Pricing and Terms""";"""The Evolution of Coverage for the SME Sub-Limited Coverage Assessing the SME""";60;04.08.2020;4
NetDiligence20;John Merchant; Optio;"""SME: Pricing and Terms""";"""The Evolution of Coverage for the SME Sub-Limited Coverage Assessing the SME""";60;04.08.2020;4
NetDiligence20;Christine Mapes (M); Arete;"""SME: Claims""";"""Loss Ratios Types of Losses Size of Losses Complexity Trends""";60;04.08.2020;5
NetDiligence20;Tamara Ashjian; Tokio Marine HCC;"""SME: Claims""";"""Loss Ratios Types of Losses Size of Losses Complexity Trends""";60;04.08.2020;5
NetDiligence20;Jennifer Beckage; Beckage;"""SME: Claims""";"""Loss Ratios Types of Losses Size of Losses Complexity Trends""";60;04.08.2020;5
NetDiligence20;Tara Bodden; At-Bay;"""SME: Claims""";"""Loss Ratios Types of Losses Size of Losses Complexity Trends""";60;04.08.2020;5
NetDiligence20;Mary Beth Borgwing; CyberClan;"""SME: Claims""";"""Loss Ratios Types of Losses Size of Losses Complexity Trends""";60;04.08.2020;5
NetDiligence20;Micah Howser (M); NetDiligence;"""SME: Risk Management""";"""Tools that are Cost Effective: Multi Factor Authentication, Password Managers, Employee Training, Dual Sign Off, and More. Risk Management Portals Pre-Breach and Post-Breach Services""";60;04.08.2020;4
NetDiligence20;Erin Burns; INSUREtrust;"""SME: Risk Management""";"""Tools that are Cost Effective: Multi Factor Authentication, Password Managers, Employee Training, Dual Sign Off, and More. Risk Management Portals Pre-Breach and Post-Breach Services""";60;04.08.2020;4
NetDiligence20;Joshua Dann; Lodestone Security;"""SME: Risk Management""";"""Tools that are Cost Effective: Multi Factor Authentication, Password Managers, Employee Training, Dual Sign Off, and More. Risk Management Portals Pre-Breach and Post-Breach Services""";60;04.08.2020;4
NetDiligence20;James Walsh; CFC Underwriting;"""SME: Risk Management""";"""Tools that are Cost Effective: Multi Factor Authentication, Password Managers, Employee Training, Dual Sign Off, and More. Risk Management Portals Pre-Breach and Post-Breach Services""";60;04.08.2020;4
NetDiligence20;Jamie Berry (M); Integreon;"""Cybersecurity Trends in the Healthcare Industry""";"""Recent Incident Response Trends in the Healthcare Industry Personal Data Element Extraction and Reporting Notification Requirements – Planning & Triggers Data Mining Strategies for Health Information""";60;09.09.2020;3
NetDiligence20;Josh Hass; Charles River Associates;"""Cybersecurity Trends in the Healthcare Industry""";"""Recent Incident Response Trends in the Healthcare Industry Personal Data Element Extraction and Reporting Notification Requirements – Planning & Triggers Data Mining Strategies for Health Information""";60;09.09.2020;3
NetDiligence20;Lynn Sessions; Baker Hostetler;"""Cybersecurity Trends in the Healthcare Industry""";"""Recent Incident Response Trends in the Healthcare Industry Personal Data Element Extraction and Reporting Notification Requirements – Planning & Triggers Data Mining Strategies for Health Information""";60;09.09.2020;3
NetDiligence20;Jamil Farshchi;Equifax;"""Leaders Needed: Preventing the Next Big Breach""";"""The roster of companies suffering massive cyber breaches keeps growing and the headlines are becoming commonplace. While every breach is different, there are shared elements that come up time and time again. Understanding what went wrong can help us better prepare, respond, and prevent future attacks. Jamil Farshchi, Equifax CISO, has spent his career building industry-leading cybersecurity programs. He has seen where companies have misstepped, but he has been able to help them learn from their mistakes to become cybersecurity leaders. Jamil believes that the cybersecurity industry needs trailblazers with the willingness to have candid conversations about what works and what does not.  Jamil is going to share his experiences and assessments from leading cybersecurity programs that protect some of the world’s most sensitive assets and offer actionable insights and tactics that would be beneficial to all cybersecurity experts.""";60;17.09.2020;1
NetDiligence20;John Donald;Axis Capital;"""35 Views of Cyber Risk""";"""Cyber risk sits at the intersection point of three different disciplines - computing, security and insurance. Each of these subjects is distinct but to properly understand cyber risk you need to master all three. This presentation looks at cyber risk from all angles, reframing familiar concepts in novel ways using theory from these and many other diverse disciplines such as economics and biology. """;60;29.09.2020;1
NetDiligence20;Pascal Millaire (M);CyberCube;"""Reinsurance Market Conditions, Part 1""";"""Fireside Chat on the State of the Reinsurance Market """;15;29.09.2020;2
NetDiligence20;Stefan Golling;Munich Re;"""Reinsurance Market Conditions, Part 1""";"""Fireside Chat on the State of the Reinsurance Market """;15;29.09.2020;2
NetDiligence20;Dan Burke (M); Woodruff Sawyer;"""Reinsurance Market Conditions, Part 2""";"""Supply and Demand of Reinsurance and Retro""";45;29.09.2020;2
NetDiligence20;Catherine Mulligan; Aon;"""Reinsurance Market Conditions, Part 2""";"""Supply and Demand of Reinsurance and Retro""";45;29.09.2020;2
NetDiligence20;Pascal Millaire (M); CyberCube;"""Reinsurance & Retro Structures, Part 1""";"""Fireside Chat on Cyber Reinsurance Structures and the Drivers of Supply and Capital Sources""";15;29.09.2020;2
NetDiligence20;Albert Benchimol; Axis Capital;"""Reinsurance & Retro Structures, Part 1""";"""Fireside Chat on Cyber Reinsurance Structures and the Drivers of Supply and Capital Sources""";15;29.09.2020;2
NetDiligence20;Siobhan O'Brien (M); Guy Carpenter;"""Reinsurance & Retro Structures, Part 2""";"""Cyber Reinsurance Structures How Are Deals Being Placed Unlocking ILS Capital Supply""";45;29.09.2020;4
NetDiligence20;Edouard von Herberstein; HSCM;"""Reinsurance & Retro Structures, Part 2""";"""Cyber Reinsurance Structures How Are Deals Being Placed Unlocking ILS Capital Supply""";45;29.09.2020;4
NetDiligence20;Adam Szakmary; Hiscox Re;"""Reinsurance & Retro Structures, Part 2""";"""Cyber Reinsurance Structures How Are Deals Being Placed Unlocking ILS Capital Supply""";45;29.09.2020;4
NetDiligence20;Darren Toh; Nephila Capital;"""Reinsurance & Retro Structures, Part 2""";"""Cyber Reinsurance Structures How Are Deals Being Placed Unlocking ILS Capital Supply""";45;29.09.2020;4
NetDiligence20;Pascal Millaire (M); CyberCube;"""Modeling: The Key to Unlocking Capital, Part 1""";"""A Fireside Chat on the importance of modeling in cyber insurance and a discussion of strategic business use cases.""";15;29.09.2020;2
NetDiligence20;Sean Ringstead; Chubb;"""Modeling: The Key to Unlocking Capital, Part 1""";"""A Fireside Chat on the importance of modeling in cyber insurance and a discussion of strategic business use cases.""";15;29.09.2020;2
NetDiligence20;Brittany Baker (M); CyberCube Analytics;"""Modeling: The Key to Unlocking Capital, Part 2""";"""Model Development Strategic Planning for Reinsurers Catastrophic Loss Examples""";45;29.09.2020;5
NetDiligence20;Simon Cartagena; SCOR;"""Modeling: The Key to Unlocking Capital, Part 2""";"""Model Development Strategic Planning for Reinsurers Catastrophic Loss Examples""";45;29.09.2020;5
NetDiligence20;Anthony Cordonnier; Guy Carpenter;"""Modeling: The Key to Unlocking Capital, Part 2""";"""Model Development Strategic Planning for Reinsurers Catastrophic Loss Examples""";45;29.09.2020;5
NetDiligence20;Justyna Pikinska; Gallagher Re;"""Modeling: The Key to Unlocking Capital, Part 2""";"""Model Development Strategic Planning for Reinsurers Catastrophic Loss Examples""";45;29.09.2020;5
NetDiligence20;Danielle Smith; RMS;"""Modeling: The Key to Unlocking Capital, Part 2""";"""Model Development Strategic Planning for Reinsurers Catastrophic Loss Examples""";45;29.09.2020;5
NetDiligence19;Shelley Ma;Coalition;"""Women In Cyber Lunch""";"""Join NetDiligence® at the second Women in Cyber Lunch, a networking event for women cyber leaders from around the country. This year’s keynote will be Shelley Ma, Associate Director of Cyber Investigations at Kivu Consulting in Toronto. Shelley is an EnCE-certified digital forensic analyst and specializes in ransomware investigations, digital forensic investigations, and incident response. Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr. This optional event costs $30.00 and will be added to your conference registration. The lunch is open to all women attendees!""";120;12.06.2019;1
NetDiligence19;Andrew Liuzzi (M); Deloitte;"""Option A: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;5
NetDiligence19;Ian Kelly; IDX;"""Option A: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;5
NetDiligence19;Bilal Malik; Stroz Friedberg;"""Option A: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;5
NetDiligence19;Brian Thornton; ProWriters;"""Option A: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;5
NetDiligence19;Melissa Ventrone; Clark Hill PLC;"""Option A: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;5
NetDiligence19;Micah Howser (M); NetDiligence;"""Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;7
NetDiligence19;Hans Allnutt; DAC Beachcroft;"""Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;7
NetDiligence19;Allen Burzen; GBMS USA;"""Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;7
NetDiligence19;John Cleary; Polsinelli;"""Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;7
NetDiligence19;Joe Mann; Arete;"""Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;7
NetDiligence19;Joe Niemczyk; Markel;"""Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;7
NetDiligence19;Erin Walters; USI Insurance Services;"""Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)""";"""An understanding of the more recent, and prevalent, cyber security threats An overview of legal, compliance and response obligations Strategies on dealing with hackers and media during a breach How to mount a response and what services and products to include""";90;12.06.2019;7
NetDiligence19;Karen Painter Randall (M); Connell Foley;"""Option C: Cyber Claims Handling Best Practices Workshop""";"""Distinguishing carriers Readiness of the claims unit who will actually handle a cyber claim Mitigating derivative risk to the policyholder and reducing cost for the insurer How are claims adjusted and processed How are vendors selected Coordination between lines""";90;12.06.2019;5
NetDiligence19;Karrieann Couture; Aon;"""Option C: Cyber Claims Handling Best Practices Workshop""";"""Distinguishing carriers Readiness of the claims unit who will actually handle a cyber claim Mitigating derivative risk to the policyholder and reducing cost for the insurer How are claims adjusted and processed How are vendors selected Coordination between lines""";90;12.06.2019;5
NetDiligence19;Jason Rebholz; Corvus;"""Option C: Cyber Claims Handling Best Practices Workshop""";"""Distinguishing carriers Readiness of the claims unit who will actually handle a cyber claim Mitigating derivative risk to the policyholder and reducing cost for the insurer How are claims adjusted and processed How are vendors selected Coordination between lines""";90;12.06.2019;5
NetDiligence19;Richard Sheridan; Berkley Cyber Risk Solutions;"""Option C: Cyber Claims Handling Best Practices Workshop""";"""Distinguishing carriers Readiness of the claims unit who will actually handle a cyber claim Mitigating derivative risk to the policyholder and reducing cost for the insurer How are claims adjusted and processed How are vendors selected Coordination between lines""";90;12.06.2019;5
NetDiligence19;Jena Valdetero; Bryan Cave Leighton Paisner LLP;"""Option C: Cyber Claims Handling Best Practices Workshop""";"""Distinguishing carriers Readiness of the claims unit who will actually handle a cyber claim Mitigating derivative risk to the policyholder and reducing cost for the insurer How are claims adjusted and processed How are vendors selected Coordination between lines""";90;12.06.2019;5
NetDiligence19;Stu Panensky (M); FisherBroyles LLP;"""Option D: Ethics: Cyber Security & Social Engineering for Lawyers and Law Firms""";"""Common and Unique Risks & Vulnerabilities for Law Firms and the Data they Process Risk Assessment and Verification Process Regulatory Guidance, Privacy Obligations & ABA Opinion 483 on Cybersecurity Lawyer’s Professional Liability & Third Party Claims Internal Safeguards: Privacy Policies, Monitoring Software, Social Engineering Training Incident Response Planning""";90;12.06.2019;5
NetDiligence19;John Barrett; BDP International;"""Option D: Ethics: Cyber Security & Social Engineering for Lawyers and Law Firms""";"""Common and Unique Risks & Vulnerabilities for Law Firms and the Data they Process Risk Assessment and Verification Process Regulatory Guidance, Privacy Obligations & ABA Opinion 483 on Cybersecurity Lawyer’s Professional Liability & Third Party Claims Internal Safeguards: Privacy Policies, Monitoring Software, Social Engineering Training Incident Response Planning""";90;12.06.2019;5
NetDiligence19;Jennifer Beckage; Beckage;"""Option D: Ethics: Cyber Security & Social Engineering for Lawyers and Law Firms""";"""Common and Unique Risks & Vulnerabilities for Law Firms and the Data they Process Risk Assessment and Verification Process Regulatory Guidance, Privacy Obligations & ABA Opinion 483 on Cybersecurity Lawyer’s Professional Liability & Third Party Claims Internal Safeguards: Privacy Policies, Monitoring Software, Social Engineering Training Incident Response Planning""";90;12.06.2019;5
NetDiligence19;Elissa Doroff; Lockton;"""Option D: Ethics: Cyber Security & Social Engineering for Lawyers and Law Firms""";"""Common and Unique Risks & Vulnerabilities for Law Firms and the Data they Process Risk Assessment and Verification Process Regulatory Guidance, Privacy Obligations & ABA Opinion 483 on Cybersecurity Lawyer’s Professional Liability & Third Party Claims Internal Safeguards: Privacy Policies, Monitoring Software, Social Engineering Training Incident Response Planning""";90;12.06.2019;5
NetDiligence19;Larry Hershman; Black Cipher Security;"""Option D: Ethics: Cyber Security & Social Engineering for Lawyers and Law Firms""";"""Common and Unique Risks & Vulnerabilities for Law Firms and the Data they Process Risk Assessment and Verification Process Regulatory Guidance, Privacy Obligations & ABA Opinion 483 on Cybersecurity Lawyer’s Professional Liability & Third Party Claims Internal Safeguards: Privacy Policies, Monitoring Software, Social Engineering Training Incident Response Planning""";90;12.06.2019;5
NetDiligence19;Laurie Kamaiko (M);Saul Ewing Arnstein & Lehr LLP;"""Claims and Losses Update: 2019 Trends""";"""A Preview of the 2019 NetDiligence® Cyber Claims Study Types of claims being covered Examination of cost Claims notice and claims handling""";45;13.06.2019;5
NetDiligence19;Robert Flowers; Travelers;"""Claims and Losses Update: 2019 Trends""";"""A Preview of the 2019 NetDiligence® Cyber Claims Study Types of claims being covered Examination of cost Claims notice and claims handling""";45;13.06.2019;5
NetDiligence19;Mark Greisiger; NetDiligence;"""Claims and Losses Update: 2019 Trends""";"""A Preview of the 2019 NetDiligence® Cyber Claims Study Types of claims being covered Examination of cost Claims notice and claims handling""";45;13.06.2019;5
NetDiligence19;John Mullen; Mullen Coughlin;"""Claims and Losses Update: 2019 Trends""";"""A Preview of the 2019 NetDiligence® Cyber Claims Study Types of claims being covered Examination of cost Claims notice and claims handling""";45;13.06.2019;5
NetDiligence19;John Spiehs; Swiss Re;"""Claims and Losses Update: 2019 Trends""";"""A Preview of the 2019 NetDiligence® Cyber Claims Study Types of claims being covered Examination of cost Claims notice and claims handling""";45;13.06.2019;5
NetDiligence19;Doug Brush; Special Counsel;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;Leslie Gravel; Willis Towers Watson;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;George Holevas; Marsh;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;Micah Howser; NetDiligence;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;Anthony Koludrovic; Berkley Cyber Risk Solutions;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;Georgea Mancuso; Black Marjieh & Sanford LLP;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;Brookes Taney; Arete;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;Ayesha West; Everest Insurance;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;Madison Williamson; Hiscox;"""Intro to Cyber""";"""The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions. After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at conferences@netdiligence.com to obtain your Discount Code.""";195;13.06.2019;9
NetDiligence19;Jon Laux (M); CyberCube Analytics;"""Breakout A: Non-Affirmative Cyber from 50,000 Feet""";"""Definitions Non-affirmative impact in non-cyber lines Coverage considerations Product development and solutions All Perils coverage""";60;13.06.2019;4
NetDiligence19;Richard DePiero; Sompo International;"""Breakout A: Non-Affirmative Cyber from 50,000 Feet""";"""Definitions Non-affirmative impact in non-cyber lines Coverage considerations Product development and solutions All Perils coverage""";60;13.06.2019;4
NetDiligence19;Anthony Shapella; AIG;"""Breakout A: Non-Affirmative Cyber from 50,000 Feet""";"""Definitions Non-affirmative impact in non-cyber lines Coverage considerations Product development and solutions All Perils coverage""";60;13.06.2019;4
NetDiligence19;Pantea Vaziri; Allianz;"""Breakout A: Non-Affirmative Cyber from 50,000 Feet""";"""Definitions Non-affirmative impact in non-cyber lines Coverage considerations Product development and solutions All Perils coverage""";60;13.06.2019;4
NetDiligence19;Dave Navetta (M); Cooley LLP;"""Breakout B: United States Regulatory Update""";"""State Attorney General Update New state regulatory frameworks Rival common practices and standards""";60;13.06.2019;4
NetDiligence19;Ryan Kriger; Office of the Attorney General of Vermont;"""Breakout B: United States Regulatory Update""";"""State Attorney General Update New state regulatory frameworks Rival common practices and standards""";60;13.06.2019;4
NetDiligence19;Travis LeBlanc; Cooley LLP;"""Breakout B: United States Regulatory Update""";"""State Attorney General Update New state regulatory frameworks Rival common practices and standards""";60;13.06.2019;4
NetDiligence19;Timothy Murphy; Office of Attorney General for the Commonwealth of Pennsylvania;"""Breakout B: United States Regulatory Update""";"""State Attorney General Update New state regulatory frameworks Rival common practices and standards""";60;13.06.2019;4
NetDiligence19;Drew Walter (M); Ascot Group;"""Breakout C: Cybersecurity Frameworks: NIST 101""";"""NIST Definitions and effective risk management Five Categories in NIST Critical activites and metrics Tools and services Tracking results""";60;13.06.2019;4
NetDiligence19;Matt Barrett; Cyber ESI;"""Breakout C: Cybersecurity Frameworks: NIST 101""";"""NIST Definitions and effective risk management Five Categories in NIST Critical activites and metrics Tools and services Tracking results""";60;13.06.2019;4
NetDiligence19;Robert Olsen; Ankura;"""Breakout C: Cybersecurity Frameworks: NIST 101""";"""NIST Definitions and effective risk management Five Categories in NIST Critical activites and metrics Tools and services Tracking results""";60;13.06.2019;4
NetDiligence19;Jon Schoonmaker; Data Risk Reduction;"""Breakout C: Cybersecurity Frameworks: NIST 101""";"""NIST Definitions and effective risk management Five Categories in NIST Critical activites and metrics Tools and services Tracking results""";60;13.06.2019;4
NetDiligence19;Julie Eichenseer (M); Guidewire: Cyence Risk Analytics;"""Breakout A: Cyber Risk Quantification""";"""The impact of cyber risk quantification to the growth of the insurance market Current approaches--the strengths and weaknesses Lessons from other types of risk Utilization of techniques such as Machine Learning and AI End goals of cyber risk quantification techniques""";60;13.06.2019;5
NetDiligence19;Peter Armstrong; Munich Re;"""Breakout A: Cyber Risk Quantification""";"""The impact of cyber risk quantification to the growth of the insurance market Current approaches--the strengths and weaknesses Lessons from other types of risk Utilization of techniques such as Machine Learning and AI End goals of cyber risk quantification techniques""";60;13.06.2019;5
NetDiligence19;Thomas Harvey; RMS;"""Breakout A: Cyber Risk Quantification""";"""The impact of cyber risk quantification to the growth of the insurance market Current approaches--the strengths and weaknesses Lessons from other types of risk Utilization of techniques such as Machine Learning and AI End goals of cyber risk quantification techniques""";60;13.06.2019;5
NetDiligence19;Kara Owens; Markel;"""Breakout A: Cyber Risk Quantification""";"""The impact of cyber risk quantification to the growth of the insurance market Current approaches--the strengths and weaknesses Lessons from other types of risk Utilization of techniques such as Machine Learning and AI End goals of cyber risk quantification techniques""";60;13.06.2019;5
NetDiligence19;Matthew Silley; CyberCube Analytics;"""Breakout A: Cyber Risk Quantification""";"""The impact of cyber risk quantification to the growth of the insurance market Current approaches--the strengths and weaknesses Lessons from other types of risk Utilization of techniques such as Machine Learning and AI End goals of cyber risk quantification techniques""";60;13.06.2019;5
NetDiligence19;Christina Terplan (M); Atheria Law;"""Breakout B: Class Action Certifications""";"""Overview of class action law and application to cybersecurity litigation Recent trends Role and importance of expert testimony Practical tips for companies, defense counsel and plaintiff’s counsel""";60;13.06.2019;3
NetDiligence19;Doug Meal; Orrick LLP;"""Breakout B: Class Action Certifications""";"""Overview of class action law and application to cybersecurity litigation Recent trends Role and importance of expert testimony Practical tips for companies, defense counsel and plaintiff’s counsel""";60;13.06.2019;3
NetDiligence19;James Pizzirusso; Hausfeld;"""Breakout B: Class Action Certifications""";"""Overview of class action law and application to cybersecurity litigation Recent trends Role and importance of expert testimony Practical tips for companies, defense counsel and plaintiff’s counsel""";60;13.06.2019;3
NetDiligence19;Ronald Raether (M); Troutman Pepper;"""Breakout C: Bug Bounty Programs""";"""Definitions & development of this industry Setting standards and payouts Legal exposures Case Study: Reporting a vulnerability Insurance implications""";60;13.06.2019;4
NetDiligence19;Deborah Chang; HackerOne;"""Breakout C: Bug Bounty Programs""";"""Definitions & development of this industry Setting standards and payouts Legal exposures Case Study: Reporting a vulnerability Insurance implications""";60;13.06.2019;4
NetDiligence19;John Farley; Gallagher;"""Breakout C: Bug Bounty Programs""";"""Definitions & development of this industry Setting standards and payouts Legal exposures Case Study: Reporting a vulnerability Insurance implications""";60;13.06.2019;4
NetDiligence19;Matthew Honea; Guidewire: Cyence Risk Analytics;"""Breakout C: Bug Bounty Programs""";"""Definitions & development of this industry Setting standards and payouts Legal exposures Case Study: Reporting a vulnerability Insurance implications""";60;13.06.2019;4
NetDiligence19;Nick Economidis (M); Crum & Forster;"""Breakout A: Cyber and Non-Cyber: Getting Coverage Right""";"""Exisiting cyber coverage approaches to bodily injury, tangible property damage, etc Coverage provided by non-cyber property & casulty insurance products Preferred approaches to coverage Best practices for seeeking the right coverage""";60;13.06.2019;4
NetDiligence19;Gail Arkin; Berkley Cyber Risk Solutions;"""Breakout A: Cyber and Non-Cyber: Getting Coverage Right""";"""Exisiting cyber coverage approaches to bodily injury, tangible property damage, etc Coverage provided by non-cyber property & casulty insurance products Preferred approaches to coverage Best practices for seeeking the right coverage""";60;13.06.2019;4
NetDiligence19;Kimberly Horn; Beazley;"""Breakout A: Cyber and Non-Cyber: Getting Coverage Right""";"""Exisiting cyber coverage approaches to bodily injury, tangible property damage, etc Coverage provided by non-cyber property & casulty insurance products Preferred approaches to coverage Best practices for seeeking the right coverage""";60;13.06.2019;4
NetDiligence19;Bob Parisi; Munich Re;"""Breakout A: Cyber and Non-Cyber: Getting Coverage Right""";"""Exisiting cyber coverage approaches to bodily injury, tangible property damage, etc Coverage provided by non-cyber property & casulty insurance products Preferred approaches to coverage Best practices for seeeking the right coverage""";60;13.06.2019;4
NetDiligence19;Jennifer Coughlin (M); Mullen Coughlin LLC;"""Breakout B: GDPR: A Year in Review""";"""GDPR: Report on regulatory actions How are US companies preparing Other regulatory changes Opportunities and challenges for vendors""";60;13.06.2019;5
NetDiligence19;Ian Birdsey; Clyde & Co LLP;"""Breakout B: GDPR: A Year in Review""";"""GDPR: Report on regulatory actions How are US companies preparing Other regulatory changes Opportunities and challenges for vendors""";60;13.06.2019;5
NetDiligence19;Michael Bruemmer; Experian;"""Breakout B: GDPR: A Year in Review""";"""GDPR: Report on regulatory actions How are US companies preparing Other regulatory changes Opportunities and challenges for vendors""";60;13.06.2019;5
NetDiligence19;Ryan Kriger; Office of the Attorney General of Vermont;"""Breakout B: GDPR: A Year in Review""";"""GDPR: Report on regulatory actions How are US companies preparing Other regulatory changes Opportunities and challenges for vendors""";60;13.06.2019;5
NetDiligence19;Lauren Winchester; Corvus Insurance;"""Breakout B: GDPR: A Year in Review""";"""GDPR: Report on regulatory actions How are US companies preparing Other regulatory changes Opportunities and challenges for vendors""";60;13.06.2019;5
NetDiligence19;David Rock (M); Allied World;"""Breakout C: MS Office 365 Security Issues""";"""Threats and vulnerabilities Problems incorporating into existing policies/tech stack Enhancing security and reducing frequency of compromises Investigation and remediation Limiting exposure in a breach""";60;13.06.2019;4
NetDiligence19;Devon Ackerman; Kroll;"""Breakout C: MS Office 365 Security Issues""";"""Threats and vulnerabilities Problems incorporating into existing policies/tech stack Enhancing security and reducing frequency of compromises Investigation and remediation Limiting exposure in a breach""";60;13.06.2019;4
NetDiligence19;David Nides; KPMG;"""Breakout C: MS Office 365 Security Issues""";"""Threats and vulnerabilities Problems incorporating into existing policies/tech stack Enhancing security and reducing frequency of compromises Investigation and remediation Limiting exposure in a breach""";60;13.06.2019;4
NetDiligence19;Dom Paluzzi; McDonald Hopkins;"""Breakout C: MS Office 365 Security Issues""";"""Threats and vulnerabilities Problems incorporating into existing policies/tech stack Enhancing security and reducing frequency of compromises Investigation and remediation Limiting exposure in a breach""";60;13.06.2019;4
NetDiligence19;Andrew Lea (M); CNA;"""Breakout A: Cyber War & Terrorism""";"""Territorial consideration Nature of state sponsored attacks Challenges in attribution Coverage provisons""";60;13.06.2019;5
NetDiligence19;Dr Raveem Ismail; Fractal Industries;"""Breakout A: Cyber War & Terrorism""";"""Territorial consideration Nature of state sponsored attacks Challenges in attribution Coverage provisons""";60;13.06.2019;5
NetDiligence19;Chris Keegan; Beecher Carlson;"""Breakout A: Cyber War & Terrorism""";"""Territorial consideration Nature of state sponsored attacks Challenges in attribution Coverage provisons""";60;13.06.2019;5
NetDiligence19;Jack Koons; Unisys;"""Breakout A: Cyber War & Terrorism""";"""Territorial consideration Nature of state sponsored attacks Challenges in attribution Coverage provisons""";60;13.06.2019;5
NetDiligence19;Josh Ladeau; Aspen Insurance;"""Breakout A: Cyber War & Terrorism""";"""Territorial consideration Nature of state sponsored attacks Challenges in attribution Coverage provisons""";60;13.06.2019;5
NetDiligence19;Kimberly Holmes (M); Perez Morris;"""Breakout B: Sector Risk: Healthcare""";"""Cyber crime and its effect on healthcare industry Evolution of Coverage Reputational Harm Claims handling""";60;13.06.2019;5
NetDiligence19;James Burns; CFC Underwriting Ltd.;"""Breakout B: Sector Risk: Healthcare""";"""Cyber crime and its effect on healthcare industry Evolution of Coverage Reputational Harm Claims handling""";60;13.06.2019;5
NetDiligence19;Mark Eggelston; Health Partners Plans;"""Breakout B: Sector Risk: Healthcare""";"""Cyber crime and its effect on healthcare industry Evolution of Coverage Reputational Harm Claims handling""";60;13.06.2019;5
NetDiligence19;Cinthia Motley; Dykema;"""Breakout B: Sector Risk: Healthcare""";"""Cyber crime and its effect on healthcare industry Evolution of Coverage Reputational Harm Claims handling""";60;13.06.2019;5
NetDiligence19;Steve Timmerman; RedSeal;"""Breakout B: Sector Risk: Healthcare""";"""Cyber crime and its effect on healthcare industry Evolution of Coverage Reputational Harm Claims handling""";60;13.06.2019;5
NetDiligence19;Gregory Bautista (M); Wilson Elser Moskowitz Edelman & Dicker LLP;"""Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response""";"""Leveraging traditional methods of data identification in incident response Enhancing cyber investigations through machine learning and advanced analytics Efficiencies gained from using traditional e-discovery techniques Case studies""";60;13.06.2019;5
NetDiligence19;Larry Brown; Epiq Global;"""Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response""";"""Leveraging traditional methods of data identification in incident response Enhancing cyber investigations through machine learning and advanced analytics Efficiencies gained from using traditional e-discovery techniques Case studies""";60;13.06.2019;5
NetDiligence19;Deborah Hirschorn; AIG;"""Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response""";"""Leveraging traditional methods of data identification in incident response Enhancing cyber investigations through machine learning and advanced analytics Efficiencies gained from using traditional e-discovery techniques Case studies""";60;13.06.2019;5
NetDiligence19;Nathan Little; Tetra Defense;"""Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response""";"""Leveraging traditional methods of data identification in incident response Enhancing cyber investigations through machine learning and advanced analytics Efficiencies gained from using traditional e-discovery techniques Case studies""";60;13.06.2019;5
NetDiligence19;Carolyn Purwin Ryan; Mullen Coughlin LLC;"""Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response""";"""Leveraging traditional methods of data identification in incident response Enhancing cyber investigations through machine learning and advanced analytics Efficiencies gained from using traditional e-discovery techniques Case studies""";60;13.06.2019;5
NetDiligence19;Robert Rosenzweig (M); Risk Strategies;"""Forensics War Stories: Cyber Fraud Hunt Operations""";"""Ransomware Business Email Compromise Insider Threat""";45;13.06.2019;4
NetDiligence19;Jarrett Kolthoff; SpearTip;"""Forensics War Stories: Cyber Fraud Hunt Operations""";"""Ransomware Business Email Compromise Insider Threat""";45;13.06.2019;4
NetDiligence19;Michael Lotas; Arete;"""Forensics War Stories: Cyber Fraud Hunt Operations""";"""Ransomware Business Email Compromise Insider Threat""";45;13.06.2019;4
NetDiligence19;Andrew Obuchowski; Charles River Associates;"""Forensics War Stories: Cyber Fraud Hunt Operations""";"""Ransomware Business Email Compromise Insider Threat""";45;13.06.2019;4
NetDiligence19;Vinny Sakore (M); NetDiligence;"""Public-Private Sector Threat Intelligence""";"""Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA) Importance of threat actor identification and attribution Threat Intelligence technology and methods""";60;14.06.2019;5
NetDiligence19;Luke Emrich; Tetra Defense;"""Public-Private Sector Threat Intelligence""";"""Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA) Importance of threat actor identification and attribution Threat Intelligence technology and methods""";60;14.06.2019;5
NetDiligence19;Richard Goldberg; Lewis Brisbois LLP;"""Public-Private Sector Threat Intelligence""";"""Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA) Importance of threat actor identification and attribution Threat Intelligence technology and methods""";60;14.06.2019;5
NetDiligence19;Ryan Leszczynski; FBI;"""Public-Private Sector Threat Intelligence""";"""Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA) Importance of threat actor identification and attribution Threat Intelligence technology and methods""";60;14.06.2019;5
NetDiligence19;Daniel Tobok; Cypfer;"""Public-Private Sector Threat Intelligence""";"""Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA) Importance of threat actor identification and attribution Threat Intelligence technology and methods""";60;14.06.2019;5
NetDiligence19;Elizabeth Dill (M); Lewis Brisbois;"""Breakout A: Ransomware: Pay or No Pay?""";"""Why Not? Law enforcement says, ""Don't do it! It only encourages crime."" You will be branded as a repeatable target You might not get your data back Then again, maybe you should Cyber Policies might cover this! Quicker and cheaper than fighting it Might be your only option""";60;14.06.2019;4
NetDiligence19;Anthony Dolce; The Hartford;"""Breakout A: Ransomware: Pay or No Pay?""";"""Why Not? Law enforcement says, ""Don't do it! It only encourages crime."" You will be branded as a repeatable target You might not get your data back Then again, maybe you should Cyber Policies might cover this! Quicker and cheaper than fighting it Might be your only option""";60;14.06.2019;4
NetDiligence19;Winston Krone; Kivu Consulting;"""Breakout A: Ransomware: Pay or No Pay?""";"""Why Not? Law enforcement says, ""Don't do it! It only encourages crime."" You will be branded as a repeatable target You might not get your data back Then again, maybe you should Cyber Policies might cover this! Quicker and cheaper than fighting it Might be your only option""";60;14.06.2019;4
NetDiligence19;Ben Stone; FBI;"""Breakout A: Ransomware: Pay or No Pay?""";"""Why Not? Law enforcement says, ""Don't do it! It only encourages crime."" You will be branded as a repeatable target You might not get your data back Then again, maybe you should Cyber Policies might cover this! Quicker and cheaper than fighting it Might be your only option""";60;14.06.2019;4
NetDiligence19;Eric Stern (M); Kaufman Dolowich Voluck;"""Breakout B: Sector Risk: Construction""";"""Challenges of underwriting Unique vulnerabilities Cost of policies Regulatory oversight""";60;14.06.2019;5
NetDiligence19;Doug Clare; FICO;"""Breakout B: Sector Risk: Construction""";"""Challenges of underwriting Unique vulnerabilities Cost of policies Regulatory oversight""";60;14.06.2019;5
NetDiligence19;Adam Cottini; CrowdStrike;"""Breakout B: Sector Risk: Construction""";"""Challenges of underwriting Unique vulnerabilities Cost of policies Regulatory oversight""";60;14.06.2019;5
NetDiligence19;Souwei Ford; Willis Towers Watson;"""Breakout B: Sector Risk: Construction""";"""Challenges of underwriting Unique vulnerabilities Cost of policies Regulatory oversight""";60;14.06.2019;5
NetDiligence19;John Merchant; Optio;"""Breakout B: Sector Risk: Construction""";"""Challenges of underwriting Unique vulnerabilities Cost of policies Regulatory oversight""";60;14.06.2019;5
NetDiligence19;Anthony Cordonnier (M); Guy Carpenter;"""Breakout C: ILS: Finding the Cyber Comfort Zone""";"""Challenges and opportunities Barriers to entry Why ILW are gaining traction What future cyber risks will propel action by the ILS?""";60;14.06.2019;4
NetDiligence19;Aritra Chatterjee; Envelop RIsk;"""Breakout C: ILS: Finding the Cyber Comfort Zone""";"""Challenges and opportunities Barriers to entry Why ILW are gaining traction What future cyber risks will propel action by the ILS?""";60;14.06.2019;4
NetDiligence19;David Kaplon; BAM;"""Breakout C: ILS: Finding the Cyber Comfort Zone""";"""Challenges and opportunities Barriers to entry Why ILW are gaining traction What future cyber risks will propel action by the ILS?""";60;14.06.2019;4
NetDiligence19;Ian Newman; Gallagher Re;"""Breakout C: ILS: Finding the Cyber Comfort Zone""";"""Challenges and opportunities Barriers to entry Why ILW are gaining traction What future cyber risks will propel action by the ILS?""";60;14.06.2019;4
NetDiligence19;Dan Burke (M); Woodruff Sawyer;"""Breakout A: Demystifying Insurer Claims Models""";"""Understand the different methods for placing business in London Claims authority & agreement parties Respective approaches on accessesing services under the policy Biggest area of coverage disputes How to ensure a positive claim experience""";60;14.06.2019;5
NetDiligence19;Lyndsey Bauer; Paragon International Insurance Brokers Ltd;"""Breakout A: Demystifying Insurer Claims Models""";"""Understand the different methods for placing business in London Claims authority & agreement parties Respective approaches on accessesing services under the policy Biggest area of coverage disputes How to ensure a positive claim experience""";60;14.06.2019;5
NetDiligence19;Jamie Bouloux; EmergIn Risk;"""Breakout A: Demystifying Insurer Claims Models""";"""Understand the different methods for placing business in London Claims authority & agreement parties Respective approaches on accessesing services under the policy Biggest area of coverage disputes How to ensure a positive claim experience""";60;14.06.2019;5
NetDiligence19;Tony Kriesel; Hiscox London Market;"""Breakout A: Demystifying Insurer Claims Models""";"""Understand the different methods for placing business in London Claims authority & agreement parties Respective approaches on accessesing services under the policy Biggest area of coverage disputes How to ensure a positive claim experience""";60;14.06.2019;5
NetDiligence19;Mike Schmitt; Tarian Underwriting;"""Breakout A: Demystifying Insurer Claims Models""";"""Understand the different methods for placing business in London Claims authority & agreement parties Respective approaches on accessesing services under the policy Biggest area of coverage disputes How to ensure a positive claim experience""";60;14.06.2019;5
NetDiligence19;Shannon Groeber (M); CFC;"""Breakout B: Biometrics""";"""What is biometric information? How / why is it collected and used? Technology that collects biometric information Biometric privacy liability landscape and class action lawsuits Employment Practices Liability (EPL) and coverage issues Compliance with biometric privacy laws""";60;14.06.2019;4
NetDiligence19;Evan Fenaroli; Philadelphia Insurance Companies;"""Breakout B: Biometrics""";"""What is biometric information? How / why is it collected and used? Technology that collects biometric information Biometric privacy liability landscape and class action lawsuits Employment Practices Liability (EPL) and coverage issues Compliance with biometric privacy laws""";60;14.06.2019;4
NetDiligence19;Doug Howard; Pondurance;"""Breakout B: Biometrics""";"""What is biometric information? How / why is it collected and used? Technology that collects biometric information Biometric privacy liability landscape and class action lawsuits Employment Practices Liability (EPL) and coverage issues Compliance with biometric privacy laws""";60;14.06.2019;4
NetDiligence19;Melissa Siebert; Shook Hardy & Bacon;"""Breakout B: Biometrics""";"""What is biometric information? How / why is it collected and used? Technology that collects biometric information Biometric privacy liability landscape and class action lawsuits Employment Practices Liability (EPL) and coverage issues Compliance with biometric privacy laws""";60;14.06.2019;4
NetDiligence19;Adam Saltzman (M); Buchanan Ingersoll & Rooney PC;"""Breakout C: U.S. Department of Justice’s View on Best Practices in Cybersecurity""";"""DOJ Cyber Guidance updates Dos and Don'ts of monitoring your network How can the DOJ and FBI support victims of cyber attacks Lessons learned""";60;14.06.2019;5
NetDiligence19;Leonard Bailey; DOJ;"""Breakout C: U.S. Department of Justice’s View on Best Practices in Cybersecurity""";"""DOJ Cyber Guidance updates Dos and Don'ts of monitoring your network How can the DOJ and FBI support victims of cyber attacks Lessons learned""";60;14.06.2019;5
NetDiligence19;Sam Rubin; Crypsis Group;"""Breakout C: U.S. Department of Justice’s View on Best Practices in Cybersecurity""";"""DOJ Cyber Guidance updates Dos and Don'ts of monitoring your network How can the DOJ and FBI support victims of cyber attacks Lessons learned""";60;14.06.2019;5
NetDiligence19;Ben Stone; FBI;"""Breakout C: U.S. Department of Justice’s View on Best Practices in Cybersecurity""";"""DOJ Cyber Guidance updates Dos and Don'ts of monitoring your network How can the DOJ and FBI support victims of cyber attacks Lessons learned""";60;14.06.2019;5
NetDiligence19;Joseph Swanson; Carlton Fields;"""Breakout C: U.S. Department of Justice’s View on Best Practices in Cybersecurity""";"""DOJ Cyber Guidance updates Dos and Don'ts of monitoring your network How can the DOJ and FBI support victims of cyber attacks Lessons learned""";60;14.06.2019;5
NetDiligence19;Noel Pearman (M); AXA XL;"""Reinsurance""";"""Coverage and claims Modeling aggregation Silent Cyber Clash coverage""";45;14.06.2019;5
NetDiligence19;Patrick Bousfield; Lockton Re;"""Reinsurance""";"""Coverage and claims Modeling aggregation Silent Cyber Clash coverage""";45;14.06.2019;5
NetDiligence19;Gina Pilla; Arch;"""Reinsurance""";"""Coverage and claims Modeling aggregation Silent Cyber Clash coverage""";45;14.06.2019;5
NetDiligence19;Matthew Prevost; Chubb;"""Reinsurance""";"""Coverage and claims Modeling aggregation Silent Cyber Clash coverage""";45;14.06.2019;5
NetDiligence19;Joshua Pyle; CyberCube Analytics;"""Reinsurance""";"""Coverage and claims Modeling aggregation Silent Cyber Clash coverage""";45;14.06.2019;5
Advisen21;Valerie Serrani; Bunge [Moderator];"""Navigating Today’s Cyber Insurance Market""";"""Cyber risk is now a board-level topic in many organizations, with corporate cybersecurity decisions opening directors up to securities class actions and accountability over data breaches. Heightened interest from the boardroom means risk managers must be ready to explain triple-digit cyber insurance price increases, new underwriting questions, and the importance of evolving cybersecurity risk management. This panel will also discuss how cyber insurance professionals can assist in educating directors and officers on their total cost of cyber risk and how to not only buy cyber insurance, but to buy the appropriate coverage to match their risks.""";45;11.05.2021;5
Advisen21;Anthony Cordonnier; Swiss Re;"""Navigating Today’s Cyber Insurance Market""";"""Cyber risk is now a board-level topic in many organizations, with corporate cybersecurity decisions opening directors up to securities class actions and accountability over data breaches. Heightened interest from the boardroom means risk managers must be ready to explain triple-digit cyber insurance price increases, new underwriting questions, and the importance of evolving cybersecurity risk management. This panel will also discuss how cyber insurance professionals can assist in educating directors and officers on their total cost of cyber risk and how to not only buy cyber insurance, but to buy the appropriate coverage to match their risks.""";45;11.05.2021;5
Advisen21;Lauren Folkard; Sompo International;"""Navigating Today’s Cyber Insurance Market""";"""Cyber risk is now a board-level topic in many organizations, with corporate cybersecurity decisions opening directors up to securities class actions and accountability over data breaches. Heightened interest from the boardroom means risk managers must be ready to explain triple-digit cyber insurance price increases, new underwriting questions, and the importance of evolving cybersecurity risk management. This panel will also discuss how cyber insurance professionals can assist in educating directors and officers on their total cost of cyber risk and how to not only buy cyber insurance, but to buy the appropriate coverage to match their risks.""";45;11.05.2021;5
Advisen21;Shannan Fort; McGill and Partners;"""Navigating Today’s Cyber Insurance Market""";"""Cyber risk is now a board-level topic in many organizations, with corporate cybersecurity decisions opening directors up to securities class actions and accountability over data breaches. Heightened interest from the boardroom means risk managers must be ready to explain triple-digit cyber insurance price increases, new underwriting questions, and the importance of evolving cybersecurity risk management. This panel will also discuss how cyber insurance professionals can assist in educating directors and officers on their total cost of cyber risk and how to not only buy cyber insurance, but to buy the appropriate coverage to match their risks.""";45;11.05.2021;5
Advisen21;Laila Khudairi; Tokio Marine Kiln;"""Navigating Today’s Cyber Insurance Market""";"""Cyber risk is now a board-level topic in many organizations, with corporate cybersecurity decisions opening directors up to securities class actions and accountability over data breaches. Heightened interest from the boardroom means risk managers must be ready to explain triple-digit cyber insurance price increases, new underwriting questions, and the importance of evolving cybersecurity risk management. This panel will also discuss how cyber insurance professionals can assist in educating directors and officers on their total cost of cyber risk and how to not only buy cyber insurance, but to buy the appropriate coverage to match their risks.""";45;11.05.2021;5
Advisen21;Jamie Pocock; Guy Carpenter [Moderator];"""The Wide World of Cyber Risk Models""";"""At a time when supply-chain risk is rising and a single cyber event can strike hundreds of organizations around the world, cyber risk models play a key role in helping insurers quantify risk aggregation and exposure to potentially catastrophic losses. The modeling world has also expanded to evaluating cyber as a systemic risk, alongside climate change and pandemics. This session will discuss how modelers see their insight evolving and how having this key insight can help insurers make underwriting and capacity decisions, detect potential balance-sheet problems, and boost resilience for the future.""";45;11.05.2021;5
Advisen21;Rory Egan; Munich Re;"""The Wide World of Cyber Risk Models""";"""At a time when supply-chain risk is rising and a single cyber event can strike hundreds of organizations around the world, cyber risk models play a key role in helping insurers quantify risk aggregation and exposure to potentially catastrophic losses. The modeling world has also expanded to evaluating cyber as a systemic risk, alongside climate change and pandemics. This session will discuss how modelers see their insight evolving and how having this key insight can help insurers make underwriting and capacity decisions, detect potential balance-sheet problems, and boost resilience for the future.""";45;11.05.2021;5
Advisen21;Lewis Guignard; Guidewire;"""The Wide World of Cyber Risk Models""";"""At a time when supply-chain risk is rising and a single cyber event can strike hundreds of organizations around the world, cyber risk models play a key role in helping insurers quantify risk aggregation and exposure to potentially catastrophic losses. The modeling world has also expanded to evaluating cyber as a systemic risk, alongside climate change and pandemics. This session will discuss how modelers see their insight evolving and how having this key insight can help insurers make underwriting and capacity decisions, detect potential balance-sheet problems, and boost resilience for the future.""";45;11.05.2021;5
Advisen21;Kelly Malynn; Beazley;"""The Wide World of Cyber Risk Models""";"""At a time when supply-chain risk is rising and a single cyber event can strike hundreds of organizations around the world, cyber risk models play a key role in helping insurers quantify risk aggregation and exposure to potentially catastrophic losses. The modeling world has also expanded to evaluating cyber as a systemic risk, alongside climate change and pandemics. This session will discuss how modelers see their insight evolving and how having this key insight can help insurers make underwriting and capacity decisions, detect potential balance-sheet problems, and boost resilience for the future.""";45;11.05.2021;5
Advisen21;Prashant Pai;Verisk;"""The Wide World of Cyber Risk Models""";"""At a time when supply-chain risk is rising and a single cyber event can strike hundreds of organizations around the world, cyber risk models play a key role in helping insurers quantify risk aggregation and exposure to potentially catastrophic losses. The modeling world has also expanded to evaluating cyber as a systemic risk, alongside climate change and pandemics. This session will discuss how modelers see their insight evolving and how having this key insight can help insurers make underwriting and capacity decisions, detect potential balance-sheet problems, and boost resilience for the future.""";45;11.05.2021;5
Advisen21;Matt Gayford;Palo Alto Networks / Unit 42;"""Security & The Supply Chain: Using Threat Intelligence & Incident Response to Stop them""";"""2020 and 2021 have been novel years for public visibility associated with security compromises affecting an aggregated source of victims. While this might not necessarily be a “new” concept, its impacts can be felt across a wide variety of industries and has a substantial global footprint. DFIR Director Matt Gayford and Senior Director Brendan Rooney discuss what claims adjusters and underwriters might expect to see pertaining to security incidents impacting the larger supply chain using core security concepts and leveraging threat intelligence to empower organizations to prevent, detect and respond to security incidents.""";8;11.05.2021;2
Advisen21;Brendan Rooney;Palo Alto Networks / Unit 42;"""Security & The Supply Chain: Using Threat Intelligence & Incident Response to Stop them""";"""2020 and 2021 have been novel years for public visibility associated with security compromises affecting an aggregated source of victims. While this might not necessarily be a “new” concept, its impacts can be felt across a wide variety of industries and has a substantial global footprint. DFIR Director Matt Gayford and Senior Director Brendan Rooney discuss what claims adjusters and underwriters might expect to see pertaining to security incidents impacting the larger supply chain using core security concepts and leveraging threat intelligence to empower organizations to prevent, detect and respond to security incidents.""";8;11.05.2021;2
Advisen21;Sean B. Hoar; Lewis Brisbois [Moderator];"""Learning from the Losses: Today’s Cyber Claims Landscape""";"""The cyber claims landscape changes rapidly and these days, it’s more active than ever. It’s becoming clear that knowing what not to do during a cyber claim is just as important as knowing what to do. What are the trends and how are they guiding underwriters now? Do they vary by region or industry group? How are insurers responding? What are the implications for insurance buyers? This session will offer a look at the lifecycle of a claim to illustrate the impacts of a cyber event and offer advice on how to bounce back quickly, whether it’s a data breach, DDoS, or ransomware.""";45;12.05.2021;5
Advisen21;Tab Bradshaw; Redpoint Cyber;"""Learning from the Losses: Today’s Cyber Claims Landscape""";"""The cyber claims landscape changes rapidly and these days, it’s more active than ever. It’s becoming clear that knowing what not to do during a cyber claim is just as important as knowing what to do. What are the trends and how are they guiding underwriters now? Do they vary by region or industry group? How are insurers responding? What are the implications for insurance buyers? This session will offer a look at the lifecycle of a claim to illustrate the impacts of a cyber event and offer advice on how to bounce back quickly, whether it’s a data breach, DDoS, or ransomware.""";45;12.05.2021;5
Advisen21;Joshua Franks; Integreon;"""Learning from the Losses: Today’s Cyber Claims Landscape""";"""The cyber claims landscape changes rapidly and these days, it’s more active than ever. It’s becoming clear that knowing what not to do during a cyber claim is just as important as knowing what to do. What are the trends and how are they guiding underwriters now? Do they vary by region or industry group? How are insurers responding? What are the implications for insurance buyers? This session will offer a look at the lifecycle of a claim to illustrate the impacts of a cyber event and offer advice on how to bounce back quickly, whether it’s a data breach, DDoS, or ransomware.""";45;12.05.2021;5
Advisen21;Natalie Graham; Mosaic Insurance;"""Learning from the Losses: Today’s Cyber Claims Landscape""";"""The cyber claims landscape changes rapidly and these days, it’s more active than ever. It’s becoming clear that knowing what not to do during a cyber claim is just as important as knowing what to do. What are the trends and how are they guiding underwriters now? Do they vary by region or industry group? How are insurers responding? What are the implications for insurance buyers? This session will offer a look at the lifecycle of a claim to illustrate the impacts of a cyber event and offer advice on how to bounce back quickly, whether it’s a data breach, DDoS, or ransomware.""";45;12.05.2021;5
Advisen21;Shay Simkin; Howden;"""Learning from the Losses: Today’s Cyber Claims Landscape""";"""The cyber claims landscape changes rapidly and these days, it’s more active than ever. It’s becoming clear that knowing what not to do during a cyber claim is just as important as knowing what to do. What are the trends and how are they guiding underwriters now? Do they vary by region or industry group? How are insurers responding? What are the implications for insurance buyers? This session will offer a look at the lifecycle of a claim to illustrate the impacts of a cyber event and offer advice on how to bounce back quickly, whether it’s a data breach, DDoS, or ransomware.""";45;12.05.2021;5
Advisen21;Oliver Brew; CyberCube [Moderator];"""The Risks and Rewards of Cyber-related Regulations""";"""All around the world, financial regulators and lawmakers have a close eye on the fast pace of cyber threats. The pressure is on cyber insurers over ransomware, and there’s increasing urgency over mandatory breach disclosures and sharing actionable threat data. What are the latest developments in regulation and how do they impact insurers? Silent cyber has become a major focus for both the industry and regulators – will coverage changes be necessary? Can we draw any insight from recent GDPR enforcement actions or cyber litigation for the future?""";45;12.05.2021;5
Advisen21;George Alayon Jr.; Bermuda Monetary Authority;"""The Risks and Rewards of Cyber-related Regulations""";"""All around the world, financial regulators and lawmakers have a close eye on the fast pace of cyber threats. The pressure is on cyber insurers over ransomware, and there’s increasing urgency over mandatory breach disclosures and sharing actionable threat data. What are the latest developments in regulation and how do they impact insurers? Silent cyber has become a major focus for both the industry and regulators – will coverage changes be necessary? Can we draw any insight from recent GDPR enforcement actions or cyber litigation for the future?""";45;12.05.2021;5
Advisen21;Dr. Rachel Anne Carter; The Geneva Association;"""The Risks and Rewards of Cyber-related Regulations""";"""All around the world, financial regulators and lawmakers have a close eye on the fast pace of cyber threats. The pressure is on cyber insurers over ransomware, and there’s increasing urgency over mandatory breach disclosures and sharing actionable threat data. What are the latest developments in regulation and how do they impact insurers? Silent cyber has become a major focus for both the industry and regulators – will coverage changes be necessary? Can we draw any insight from recent GDPR enforcement actions or cyber litigation for the future?""";45;12.05.2021;5
Advisen21;Justin Herring; New York Department of Financial Services;"""The Risks and Rewards of Cyber-related Regulations""";"""All around the world, financial regulators and lawmakers have a close eye on the fast pace of cyber threats. The pressure is on cyber insurers over ransomware, and there’s increasing urgency over mandatory breach disclosures and sharing actionable threat data. What are the latest developments in regulation and how do they impact insurers? Silent cyber has become a major focus for both the industry and regulators – will coverage changes be necessary? Can we draw any insight from recent GDPR enforcement actions or cyber litigation for the future?""";45;12.05.2021;5
Advisen21;Brian Warszona; Marsh & McLennan;"""The Risks and Rewards of Cyber-related Regulations""";"""All around the world, financial regulators and lawmakers have a close eye on the fast pace of cyber threats. The pressure is on cyber insurers over ransomware, and there’s increasing urgency over mandatory breach disclosures and sharing actionable threat data. What are the latest developments in regulation and how do they impact insurers? Silent cyber has become a major focus for both the industry and regulators – will coverage changes be necessary? Can we draw any insight from recent GDPR enforcement actions or cyber litigation for the future?""";45;12.05.2021;5
Advisen21;Steven Hadwin; Norton Rose Fulbright LLP;"""Changing dynamics in the cyber insurance ecosystem""";"""The European Cyber Insurance market is changing drastically, and becoming more and more complex. The news is filled with stories of breaches and ever increasing threats. Fortunately CrowdStrike is here to help. In this video, CrowdStrike’s Marko Polunic and Steven Hadwin of Norton Rose Fulbright discuss some of the ways to meet these threats and say secure in an increasingly difficult threat landscape.""";8;12.05.2021;2
Advisen21;Marko Polunic; CrowdStrike;"""Changing dynamics in the cyber insurance ecosystem""";"""The European Cyber Insurance market is changing drastically, and becoming more and more complex. The news is filled with stories of breaches and ever increasing threats. Fortunately CrowdStrike is here to help. In this video, CrowdStrike’s Marko Polunic and Steven Hadwin of Norton Rose Fulbright discuss some of the ways to meet these threats and say secure in an increasingly difficult threat landscape.""";8;12.05.2021;2
Advisen19;Menny Barzilay;FortyTwo Global;"""Morning Keynote Adress""";"""?""";30;19.03.2019;1
Advisen19;Monica Tigleanu; JLT [Moderator];"""The Buyer Perspective""";"""A panel of senior risk managers discusses the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;19.03.2019;3
Advisen19;Stephen Porter; Pearson;"""The Buyer Perspective""";"""A panel of senior risk managers discusses the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;19.03.2019;3
Advisen19;Jordane Terrasse; London Stock Exchange Group;"""The Buyer Perspective""";"""A panel of senior risk managers discusses the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;19.03.2019;3
Advisen19;Shay Simkin; Howden Insurance Brokers [Moderator];"""Insurance marketplace trends: a global perspective""";"""This session is a look at key insurance markets around the world, who is buying cyber insurance and why are they buying it? What coverages are deemed the most essential? What are the growth prospects of the various regions? What are the most significant underwriting and coverage concerns? A panel of senior underwriters and brokers will share their insights.""";45;19.03.2019;5
Advisen19;Anthony Cordonnier; Swiss Re;"""Insurance marketplace trends: a global perspective""";"""This session is a look at key insurance markets around the world, who is buying cyber insurance and why are they buying it? What coverages are deemed the most essential? What are the growth prospects of the various regions? What are the most significant underwriting and coverage concerns? A panel of senior underwriters and brokers will share their insights.""";45;19.03.2019;5
Advisen19;Alex Jomaa; Tokio Marine Kiln;"""Insurance marketplace trends: a global perspective""";"""This session is a look at key insurance markets around the world, who is buying cyber insurance and why are they buying it? What coverages are deemed the most essential? What are the growth prospects of the various regions? What are the most significant underwriting and coverage concerns? A panel of senior underwriters and brokers will share their insights.""";45;19.03.2019;5
Advisen19;Ian Newman; Capsicum Re;"""Insurance marketplace trends: a global perspective""";"""This session is a look at key insurance markets around the world, who is buying cyber insurance and why are they buying it? What coverages are deemed the most essential? What are the growth prospects of the various regions? What are the most significant underwriting and coverage concerns? A panel of senior underwriters and brokers will share their insights.""";45;19.03.2019;5
Advisen19;Tom Spier; CyberScout;"""Insurance marketplace trends: a global perspective""";"""This session is a look at key insurance markets around the world, who is buying cyber insurance and why are they buying it? What coverages are deemed the most essential? What are the growth prospects of the various regions? What are the most significant underwriting and coverage concerns? A panel of senior underwriters and brokers will share their insights.""";45;19.03.2019;5
Advisen19;Helen Chapman; Aon UK Limited [Moderator];"""Coverage issues: Gaps & overlaps:""";""" Cyber insurance policies can vary materially from insurer to insurer, sometimes causing confusion as to what is and isn’t covered. Additionally, other types of policies often provide coverage for cyber-related incidents, and may overlap with dedicated cyber risk policies. This session will help untangle knotty coverage questions and will provide actionable information for structuring adequate and efficient coverage for cyber events.""";45;19.03.2019;4
Advisen19;Mark Camillo; AIG;"""Coverage issues: Gaps & overlaps:""";""" Cyber insurance policies can vary materially from insurer to insurer, sometimes causing confusion as to what is and isn’t covered. Additionally, other types of policies often provide coverage for cyber-related incidents, and may overlap with dedicated cyber risk policies. This session will help untangle knotty coverage questions and will provide actionable information for structuring adequate and efficient coverage for cyber events.""";45;19.03.2019;4
Advisen19;Laila Khudairi; Tokio Marine Kiln;"""Coverage issues: Gaps & overlaps:""";""" Cyber insurance policies can vary materially from insurer to insurer, sometimes causing confusion as to what is and isn’t covered. Additionally, other types of policies often provide coverage for cyber-related incidents, and may overlap with dedicated cyber risk policies. This session will help untangle knotty coverage questions and will provide actionable information for structuring adequate and efficient coverage for cyber events.""";45;19.03.2019;4
Advisen19;David Pryce; Fenchurch Law;"""Coverage issues: Gaps & overlaps:""";""" Cyber insurance policies can vary materially from insurer to insurer, sometimes causing confusion as to what is and isn’t covered. Additionally, other types of policies often provide coverage for cyber-related incidents, and may overlap with dedicated cyber risk policies. This session will help untangle knotty coverage questions and will provide actionable information for structuring adequate and efficient coverage for cyber events.""";45;19.03.2019;4
Advisen19;Nathan Hankin; Jelf [Moderator];"""Hackers Want to Get Physical""";""" Anything attached through the internet can be hacked, including industrial control systems, sensors, vehicles, and medical devices. Thus far there have been few actual incidents, but the potential for cyber-related bodily injury and property damage is significant. This session will examine the cyber risks of physical systems and will offer practical advice on risk management and insurance strategies.""";45;19.03.2019;5
Advisen19;Dr Andrew Coburn; University of Cambridge Centre for Risk Studies;"""Hackers Want to Get Physical""";""" Anything attached through the internet can be hacked, including industrial control systems, sensors, vehicles, and medical devices. Thus far there have been few actual incidents, but the potential for cyber-related bodily injury and property damage is significant. This session will examine the cyber risks of physical systems and will offer practical advice on risk management and insurance strategies.""";45;19.03.2019;5
Advisen19;Runli Guo; JLT;"""Hackers Want to Get Physical""";""" Anything attached through the internet can be hacked, including industrial control systems, sensors, vehicles, and medical devices. Thus far there have been few actual incidents, but the potential for cyber-related bodily injury and property damage is significant. This session will examine the cyber risks of physical systems and will offer practical advice on risk management and insurance strategies.""";45;19.03.2019;5
Advisen19;Winston Krone; Kivu;"""Hackers Want to Get Physical""";""" Anything attached through the internet can be hacked, including industrial control systems, sensors, vehicles, and medical devices. Thus far there have been few actual incidents, but the potential for cyber-related bodily injury and property damage is significant. This session will examine the cyber risks of physical systems and will offer practical advice on risk management and insurance strategies.""";45;19.03.2019;5
Advisen19;Lindsay B. Nickle; Lewis Brisbois;"""Hackers Want to Get Physical""";""" Anything attached through the internet can be hacked, including industrial control systems, sensors, vehicles, and medical devices. Thus far there have been few actual incidents, but the potential for cyber-related bodily injury and property damage is significant. This session will examine the cyber risks of physical systems and will offer practical advice on risk management and insurance strategies.""";45;19.03.2019;5
Advisen19;Erin Ayers; Advisen [Moderator];"""Privacy Regulation Goes Global: Compliance and Insurance Coverage Issues """;"""The Swiss cheese of global privacy regulations is increasingly looking air tight.  While GDPR has dominated privacy discussions over the past year, significant privacy regulations have been, or soon will be, implemented elsewhere in the world. Using a case study, this session will contrast GDPR with key regulations in the Americas, the Middle East, and Asia Pacific, and will provide guidance on staying compliant with a patchwork of sometimes contradictory regulatory requirements.""";45;19.03.2019;5
Advisen19;Hans Allnutt; DAC Beachcroft LLP;"""Privacy Regulation Goes Global: Compliance and Insurance Coverage Issues """;"""The Swiss cheese of global privacy regulations is increasingly looking air tight.  While GDPR has dominated privacy discussions over the past year, significant privacy regulations have been, or soon will be, implemented elsewhere in the world. Using a case study, this session will contrast GDPR with key regulations in the Americas, the Middle East, and Asia Pacific, and will provide guidance on staying compliant with a patchwork of sometimes contradictory regulatory requirements.""";45;19.03.2019;5
Advisen19;Sean Hoar; Lewis Brisbois;"""Privacy Regulation Goes Global: Compliance and Insurance Coverage Issues """;"""The Swiss cheese of global privacy regulations is increasingly looking air tight.  While GDPR has dominated privacy discussions over the past year, significant privacy regulations have been, or soon will be, implemented elsewhere in the world. Using a case study, this session will contrast GDPR with key regulations in the Americas, the Middle East, and Asia Pacific, and will provide guidance on staying compliant with a patchwork of sometimes contradictory regulatory requirements.""";45;19.03.2019;5
Advisen19;Dr. Thomas Rothärmel; Munich Re;"""Privacy Regulation Goes Global: Compliance and Insurance Coverage Issues """;"""The Swiss cheese of global privacy regulations is increasingly looking air tight.  While GDPR has dominated privacy discussions over the past year, significant privacy regulations have been, or soon will be, implemented elsewhere in the world. Using a case study, this session will contrast GDPR with key regulations in the Americas, the Middle East, and Asia Pacific, and will provide guidance on staying compliant with a patchwork of sometimes contradictory regulatory requirements.""";45;19.03.2019;5
Advisen19;Bridget Treacy; Hunton Andrews Kurth LLP;"""Privacy Regulation Goes Global: Compliance and Insurance Coverage Issues """;"""The Swiss cheese of global privacy regulations is increasingly looking air tight.  While GDPR has dominated privacy discussions over the past year, significant privacy regulations have been, or soon will be, implemented elsewhere in the world. Using a case study, this session will contrast GDPR with key regulations in the Americas, the Middle East, and Asia Pacific, and will provide guidance on staying compliant with a patchwork of sometimes contradictory regulatory requirements.""";45;19.03.2019;5
Advisen19;David Rees; RKH Specialty [Moderator];"""Cyber Claims: A Focus on Settling Business Interruption Claims""";"""What happens after an incident is reported to insurers? This session will examine the process for managing a cyber claim with a particular emphasis on business interruption claims. Business interruption claims are among the most complex to settle, and the procedures for calculating the value of a loss are often misunderstood. This session will look at actual policy wordings and will demonstrate how those wordings translate into claims payments under several scenarios.""";45;19.03.2019;4
Advisen19;Ben Hobby; BTVK Advisory LLP;"""Cyber Claims: A Focus on Settling Business Interruption Claims""";"""What happens after an incident is reported to insurers? This session will examine the process for managing a cyber claim with a particular emphasis on business interruption claims. Business interruption claims are among the most complex to settle, and the procedures for calculating the value of a loss are often misunderstood. This session will look at actual policy wordings and will demonstrate how those wordings translate into claims payments under several scenarios.""";45;19.03.2019;4
Advisen19;Luke Johnson; AmTrust at Lloyd’s;"""Cyber Claims: A Focus on Settling Business Interruption Claims""";"""What happens after an incident is reported to insurers? This session will examine the process for managing a cyber claim with a particular emphasis on business interruption claims. Business interruption claims are among the most complex to settle, and the procedures for calculating the value of a loss are often misunderstood. This session will look at actual policy wordings and will demonstrate how those wordings translate into claims payments under several scenarios.""";45;19.03.2019;4
Advisen19;Jakob von Uckermann; Munich Re;"""Cyber Claims: A Focus on Settling Business Interruption Claims""";"""What happens after an incident is reported to insurers? This session will examine the process for managing a cyber claim with a particular emphasis on business interruption claims. Business interruption claims are among the most complex to settle, and the procedures for calculating the value of a loss are often misunderstood. This session will look at actual policy wordings and will demonstrate how those wordings translate into claims payments under several scenarios.""";45;19.03.2019;4
Advisen19;Richard Grant; JLT Specialty [Moderator];"""Structuring a Global Cyber Insurance Program""";"""Structuring a global property or casualty insurance program can be complex, but the issues are well understood. Are those same issues relevant for a global cyber insurance program? What are the challenges in assembling coverage for a global program? A panel of experts will review the regulatory and tax issues, and will demonstrate how a compliant global program can be assembled in the current market.""";45;19.03.2019;4
Advisen19;Thomas Clayton;Zurich;"""Structuring a Global Cyber Insurance Program""";"""Structuring a global property or casualty insurance program can be complex, but the issues are well understood. Are those same issues relevant for a global cyber insurance program? What are the challenges in assembling coverage for a global program? A panel of experts will review the regulatory and tax issues, and will demonstrate how a compliant global program can be assembled in the current market.""";45;19.03.2019;4
Advisen19;Elke Marschall; Global Insurance Management Allianz SE;"""Structuring a Global Cyber Insurance Program""";"""Structuring a global property or casualty insurance program can be complex, but the issues are well understood. Are those same issues relevant for a global cyber insurance program? What are the challenges in assembling coverage for a global program? A panel of experts will review the regulatory and tax issues, and will demonstrate how a compliant global program can be assembled in the current market.""";45;19.03.2019;4
Advisen19;Praveen Sharma; Marsh;"""Structuring a Global Cyber Insurance Program""";"""Structuring a global property or casualty insurance program can be complex, but the issues are well understood. Are those same issues relevant for a global cyber insurance program? What are the challenges in assembling coverage for a global program? A panel of experts will review the regulatory and tax issues, and will demonstrate how a compliant global program can be assembled in the current market.""";45;19.03.2019;4
Advisen19;David Bradford; Advisen [Moderator];"""Blockchain for Blockheads: The Impact on Cyber Risk and Insurance?""";"""Some advocates claim that blockchain technology will be as revolutionary and transformational as the internet itself. That remains to be seen, of course, but blockchain is impacting industries as diverse as shipping and financial services. This session will explain how blockchain works, and how it could revolutionize the cyber insurance marketplace. What do carriers & risk managers need to know now?""";45;19.03.2019;3
Advisen19;Gary Nuttall; Distlytics;"""Blockchain for Blockheads: The Impact on Cyber Risk and Insurance?""";"""Some advocates claim that blockchain technology will be as revolutionary and transformational as the internet itself. That remains to be seen, of course, but blockchain is impacting industries as diverse as shipping and financial services. This session will explain how blockchain works, and how it could revolutionize the cyber insurance marketplace. What do carriers & risk managers need to know now?""";45;19.03.2019;3
Advisen19;Ryan Rugg; R3;"""Blockchain for Blockheads: The Impact on Cyber Risk and Insurance?""";"""Some advocates claim that blockchain technology will be as revolutionary and transformational as the internet itself. That remains to be seen, of course, but blockchain is impacting industries as diverse as shipping and financial services. This session will explain how blockchain works, and how it could revolutionize the cyber insurance marketplace. What do carriers & risk managers need to know now?""";45;19.03.2019;3
Advisen19;Jim Blinn; Advisen [Moderator];"""Cyber Risk Models""";"""In recent years a number of companies have introduced tools to model the cyber risk of individual organizations as well as the aggregate cyber risk within an insurer’s portfolio of policies. This session will explore the state of the art in cyber risk modeling, and will explain how the various models compare with one another.""";45;19.03.2019;6
Advisen19;Ian Bird; Guidewire;"""Cyber Risk Models""";"""In recent years a number of companies have introduced tools to model the cyber risk of individual organizations as well as the aggregate cyber risk within an insurer’s portfolio of policies. This session will explore the state of the art in cyber risk modeling, and will explain how the various models compare with one another.""";45;19.03.2019;6
Advisen19;Oliver Brew; CyberCube Analytics;"""Cyber Risk Models""";"""In recent years a number of companies have introduced tools to model the cyber risk of individual organizations as well as the aggregate cyber risk within an insurer’s portfolio of policies. This session will explore the state of the art in cyber risk modeling, and will explain how the various models compare with one another.""";45;19.03.2019;6
Advisen19;Neil Cantle; Milliman;"""Cyber Risk Models""";"""In recent years a number of companies have introduced tools to model the cyber risk of individual organizations as well as the aggregate cyber risk within an insurer’s portfolio of policies. This session will explore the state of the art in cyber risk modeling, and will explain how the various models compare with one another.""";45;19.03.2019;6
Advisen19;Doug Clare; FICO;"""Cyber Risk Models""";"""In recent years a number of companies have introduced tools to model the cyber risk of individual organizations as well as the aggregate cyber risk within an insurer’s portfolio of policies. This session will explore the state of the art in cyber risk modeling, and will explain how the various models compare with one another.""";45;19.03.2019;6
Advisen19;Prashant Pai; Verisk;"""Cyber Risk Models""";"""In recent years a number of companies have introduced tools to model the cyber risk of individual organizations as well as the aggregate cyber risk within an insurer’s portfolio of policies. This session will explore the state of the art in cyber risk modeling, and will explain how the various models compare with one another.""";45;19.03.2019;6
Advisen19;Jodi Beaubien; Symantec [Moderator];"""A Series of Unfortunate Events: How Small Lapses in Cyber Hygiene Can Lead to Big Losses""";"""Even companies that are trying to be diligent in their cybersecurity practices can experience catastrophic cyber events. This session will take a case study approach to examine how small errors can grow into big losses, and the steps companies can take to assure they aren’t victims of “a series of unfortunate events.""";30;19.03.2019;3
Advisen19;Andrew Beckett; Kroll;"""A Series of Unfortunate Events: How Small Lapses in Cyber Hygiene Can Lead to Big Losses""";"""Even companies that are trying to be diligent in their cybersecurity practices can experience catastrophic cyber events. This session will take a case study approach to examine how small errors can grow into big losses, and the steps companies can take to assure they aren’t victims of “a series of unfortunate events.""";30;19.03.2019;3
Advisen19;Mathew Cherian; BitSight;"""A Series of Unfortunate Events: How Small Lapses in Cyber Hygiene Can Lead to Big Losses""";"""Even companies that are trying to be diligent in their cybersecurity practices can experience catastrophic cyber events. This session will take a case study approach to examine how small errors can grow into big losses, and the steps companies can take to assure they aren’t victims of “a series of unfortunate events.""";30;19.03.2019;3
Advisen19;Barbara Mulder; Burson Cohn & Wolfe;"""Brand and Reputation Risk""";"""Surveys of corporate risk managers consistently place brand and reputation risk high on their list of cyber-related concerns. This session will look at various cyber loss scenarios, demonstrate the potential impact on brand and reputation, and provide guidance on managing the risk.""";60;19.03.2019;3
Advisen19;Jim Steven; Experian Consumer Services;"""Brand and Reputation Risk""";"""Surveys of corporate risk managers consistently place brand and reputation risk high on their list of cyber-related concerns. This session will look at various cyber loss scenarios, demonstrate the potential impact on brand and reputation, and provide guidance on managing the risk.""";60;19.03.2019;3
Advisen19;Elizabeth Queen; Wolters Kluwer;"""Brand and Reputation Risk""";"""Surveys of corporate risk managers consistently place brand and reputation risk high on their list of cyber-related concerns. This session will look at various cyber loss scenarios, demonstrate the potential impact on brand and reputation, and provide guidance on managing the risk.""";60;19.03.2019;3
Advisen18;Hans Allnutt; DAC Beachcroft LLP;"""Opening Remarks by our 2018 Conference Co-Chairs""";"""?""";10;06.03.2018;2
Advisen18;Shay Simkin; Howden Israel;"""Opening Remarks by our 2018 Conference Co-Chairs""";"""?""";10;06.03.2018;2
Advisen18;T. Casey Fleming; BLACKOPS Partners;"""Morning Keynote Address""";"""A specialist in cyber warfare, Casey will speak to the global threat of nation state attacks and cyber warfare strategy. As a cyber and strategy advisor to The White House, Congress, government agencies, the military, and enterprise on cyber warfare – engaging with public-private partnerships globally – Casey will give practical guidance on knowing your cybersecurity adversaries: what are their intentions, strategy and tactics? What should you be thinking about to protect your company?""";30;06.03.2018;1
Advisen18;Sarah Stephens; JLT Specialty (Moderator);"""The Buyer’s Perspective""";"""A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organisations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;06.03.2018;4
Advisen18;Jeremy Harvey; Barclays;"""The Buyer’s Perspective""";"""A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organisations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;06.03.2018;4
Advisen18;Elizabeth Queen; Wolters Kluwer;"""The Buyer’s Perspective""";"""A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organisations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;06.03.2018;4
Advisen18;Henriette Scotwin Guespereau; Maersk;"""The Buyer’s Perspective""";"""A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organisations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;06.03.2018;4
Advisen18;Winston Krone; Kivu (Moderator);"""Event Round-up""";"""This session will take a look at some recent cyber events, including Not-Petya and Equifax. What happened? How were they carried out? What should risk managers be concerned about for their organisations?""";30;06.03.2018;3
Advisen18;Oliver Brew; CyberCube Analytics;"""Event Round-up""";"""This session will take a look at some recent cyber events, including Not-Petya and Equifax. What happened? How were they carried out? What should risk managers be concerned about for their organisations?""";30;06.03.2018;3
Advisen18;Sean Hoar; Lewis Brisbois Bisgaard & Smith LLP;"""Event Round-up""";"""This session will take a look at some recent cyber events, including Not-Petya and Equifax. What happened? How were they carried out? What should risk managers be concerned about for their organisations?""";30;06.03.2018;3
Advisen18;Mark Camillo; AIG (Moderator);"""Up Periscope: Underwriting Cyber Risk""";"""Given the inherent tension between simplifying the application process and the need for in-depth information, the need for better underwriting tools has never been greater. This panel will showcase some emerging technologies to measure and underwrite risks. What tools are underwriters using? How do you measure the effectiveness of the tools that are used?""";30;06.03.2018;3
Advisen18;Samit Shah; BitSight Technologies;"""Up Periscope: Underwriting Cyber Risk""";"""Given the inherent tension between simplifying the application process and the need for in-depth information, the need for better underwriting tools has never been greater. This panel will showcase some emerging technologies to measure and underwrite risks. What tools are underwriters using? How do you measure the effectiveness of the tools that are used?""";30;06.03.2018;3
Advisen18;Aloysius Tan; Advisen;"""Up Periscope: Underwriting Cyber Risk""";"""Given the inherent tension between simplifying the application process and the need for in-depth information, the need for better underwriting tools has never been greater. This panel will showcase some emerging technologies to measure and underwrite risks. What tools are underwriters using? How do you measure the effectiveness of the tools that are used?""";30;06.03.2018;3
Advisen18;Mark Bannon; Zurich (Moderator);"""Protecting your Reputation: Responding to a Breach""";"""Using recent claims examples, this session will look at what makes a good response to a breach event and how you can change the course of events to manage a more successful response. Panelists will also dig into the availability of reputational harm cover in the insurance market: what does it cover?""";60;06.03.2018;4
Advisen18;Hans Allnutt; DAC Beachcroft LLP;"""Protecting your Reputation: Responding to a Breach""";"""Using recent claims examples, this session will look at what makes a good response to a breach event and how you can change the course of events to manage a more successful response. Panelists will also dig into the availability of reputational harm cover in the insurance market: what does it cover?""";60;06.03.2018;4
Advisen18;Michael Bruemmer; Experian;"""Protecting your Reputation: Responding to a Breach""";"""Using recent claims examples, this session will look at what makes a good response to a breach event and how you can change the course of events to manage a more successful response. Panelists will also dig into the availability of reputational harm cover in the insurance market: what does it cover?""";60;06.03.2018;4
Advisen18;Lawrence Dore; DRD Partnership;"""Protecting your Reputation: Responding to a Breach""";"""Using recent claims examples, this session will look at what makes a good response to a breach event and how you can change the course of events to manage a more successful response. Panelists will also dig into the availability of reputational harm cover in the insurance market: what does it cover?""";60;06.03.2018;4
Advisen18;Kimberly Manibusan; FICO (Moderator);"""The Cyber Hurricane: Quantifying Aggregation""";"""The concept of a Cyber Hurricane – a catastrophe event that could pose a balance sheet risk to insurers – has only recently become part of the cyber vernacular. Lloyd’s of London was ahead on this concept, and has developed Realistic Disaster Scenarios around cyber catastrophe. This session will outline the scenarios and explore the accumulation risks they are trying to gather. Panelists will also look at how carriers are identifying, measuring and reporting aggregation risks within their cyber portfolios. Panelists will outline how they are leveraging technology and big data to help them understand where their risk falls within these scenarios.""";60;06.03.2018;4
Advisen18;Domenico del Re; PwC;"""The Cyber Hurricane: Quantifying Aggregation""";"""The concept of a Cyber Hurricane – a catastrophe event that could pose a balance sheet risk to insurers – has only recently become part of the cyber vernacular. Lloyd’s of London was ahead on this concept, and has developed Realistic Disaster Scenarios around cyber catastrophe. This session will outline the scenarios and explore the accumulation risks they are trying to gather. Panelists will also look at how carriers are identifying, measuring and reporting aggregation risks within their cyber portfolios. Panelists will outline how they are leveraging technology and big data to help them understand where their risk falls within these scenarios.""";60;06.03.2018;4
Advisen18;Rory Egan; Munich Re;"""The Cyber Hurricane: Quantifying Aggregation""";"""The concept of a Cyber Hurricane – a catastrophe event that could pose a balance sheet risk to insurers – has only recently become part of the cyber vernacular. Lloyd’s of London was ahead on this concept, and has developed Realistic Disaster Scenarios around cyber catastrophe. This session will outline the scenarios and explore the accumulation risks they are trying to gather. Panelists will also look at how carriers are identifying, measuring and reporting aggregation risks within their cyber portfolios. Panelists will outline how they are leveraging technology and big data to help them understand where their risk falls within these scenarios.""";60;06.03.2018;4
Advisen18;Adelle Gruber; Brit Insurance;"""The Cyber Hurricane: Quantifying Aggregation""";"""The concept of a Cyber Hurricane – a catastrophe event that could pose a balance sheet risk to insurers – has only recently become part of the cyber vernacular. Lloyd’s of London was ahead on this concept, and has developed Realistic Disaster Scenarios around cyber catastrophe. This session will outline the scenarios and explore the accumulation risks they are trying to gather. Panelists will also look at how carriers are identifying, measuring and reporting aggregation risks within their cyber portfolios. Panelists will outline how they are leveraging technology and big data to help them understand where their risk falls within these scenarios.""";60;06.03.2018;4
Advisen18;Shay Simkin; Howden Israel (Moderator);"""Selling the Board on Cyber Insurance""";"""This session will give top tips on how to construct a business case for cyber insurance within your organisation. Who is your audience and what traps should you avoid as you make a pitch for a cyber insurance purchase to your Board of Directors?""";30;06.03.2018;3
Advisen18;Lyn Grobler; Hyperion Insurance Group;"""Selling the Board on Cyber Insurance""";"""This session will give top tips on how to construct a business case for cyber insurance within your organisation. Who is your audience and what traps should you avoid as you make a pitch for a cyber insurance purchase to your Board of Directors?""";30;06.03.2018;3
Advisen18;Valerie Jenkins; TSB Bank;"""Selling the Board on Cyber Insurance""";"""This session will give top tips on how to construct a business case for cyber insurance within your organisation. Who is your audience and what traps should you avoid as you make a pitch for a cyber insurance purchase to your Board of Directors?""";30;06.03.2018;3
Advisen18;David Rees; RKH Specialty Limited (Moderator);"""Gaps & Overlaps""";"""Cyber perils are expanding at a rapid pace – and bleeding out of standalone cyber and into many other ‘traditional’ lines of business including property, crime, D&O. This session will address what cover is offered and where. Speakers will address where ‘silent cyber’ cover might be lurking.""";60;06.03.2018;6
Advisen18;Johnny Fraser; Capsicum Re;"""Gaps & Overlaps""";"""Cyber perils are expanding at a rapid pace – and bleeding out of standalone cyber and into many other ‘traditional’ lines of business including property, crime, D&O. This session will address what cover is offered and where. Speakers will address where ‘silent cyber’ cover might be lurking.""";60;06.03.2018;6
Advisen18;Russell Kennedy; Brit Insurance;"""Gaps & Overlaps""";"""Cyber perils are expanding at a rapid pace – and bleeding out of standalone cyber and into many other ‘traditional’ lines of business including property, crime, D&O. This session will address what cover is offered and where. Speakers will address where ‘silent cyber’ cover might be lurking.""";60;06.03.2018;6
Advisen18;Julian Miller; DAC Beachcroft LLP;"""Gaps & Overlaps""";"""Cyber perils are expanding at a rapid pace – and bleeding out of standalone cyber and into many other ‘traditional’ lines of business including property, crime, D&O. This session will address what cover is offered and where. Speakers will address where ‘silent cyber’ cover might be lurking.""";60;06.03.2018;6
Advisen18;Jacqueline Spencer-Sim; Axis Capital;"""Gaps & Overlaps""";"""Cyber perils are expanding at a rapid pace – and bleeding out of standalone cyber and into many other ‘traditional’ lines of business including property, crime, D&O. This session will address what cover is offered and where. Speakers will address where ‘silent cyber’ cover might be lurking.""";60;06.03.2018;6
Advisen18;Scott Stransky; AIR Worldwide;"""Gaps & Overlaps""";"""Cyber perils are expanding at a rapid pace – and bleeding out of standalone cyber and into many other ‘traditional’ lines of business including property, crime, D&O. This session will address what cover is offered and where. Speakers will address where ‘silent cyber’ cover might be lurking.""";60;06.03.2018;6
Advisen18;Rafael Sanchez; Beazley (Moderator);"""Managing Third Party Cyber Risk: From Vendor to M&A""";"""Third party cyber risk confronts organisations within a continually evolving threat landscape. How are CISOs and risk managers able to assess and quantify the risks of third parties including vendors, supply chain participants and acquisition candidates? How do tools — including security ratings — assist in risk evaluation? How can organisations best communicate their initiatives to the insurance community?""";30;06.03.2018;3
Advisen18;Ariel Evans; InnoSec;"""Managing Third Party Cyber Risk: From Vendor to M&A""";"""Third party cyber risk confronts organisations within a continually evolving threat landscape. How are CISOs and risk managers able to assess and quantify the risks of third parties including vendors, supply chain participants and acquisition candidates? How do tools — including security ratings — assist in risk evaluation? How can organisations best communicate their initiatives to the insurance community?""";30;06.03.2018;3
Advisen18;Matt Palmer; Willis Towers Watson;"""Managing Third Party Cyber Risk: From Vendor to M&A""";"""Third party cyber risk confronts organisations within a continually evolving threat landscape. How are CISOs and risk managers able to assess and quantify the risks of third parties including vendors, supply chain participants and acquisition candidates? How do tools — including security ratings — assist in risk evaluation? How can organisations best communicate their initiatives to the insurance community?""";30;06.03.2018;3
Advisen18;John Merchant; Cyence Risk Analytics (Moderator);"""When Systems Stop Working: Measuring Business Interruption Exposures""";"""The increased reliance on technology within the connected economy has spawned new and more complex exposures.  Identifying, measuring and managing Business Interruption and Contingent Business Interruption exposures has become a critical need.  Leading providers will discuss the development of new techniques for measuring this exposure.""";30;06.03.2018;3
Advisen18;Jamie Bouloux; EmergIn Risk;"""When Systems Stop Working: Measuring Business Interruption Exposures""";"""The increased reliance on technology within the connected economy has spawned new and more complex exposures.  Identifying, measuring and managing Business Interruption and Contingent Business Interruption exposures has become a critical need.  Leading providers will discuss the development of new techniques for measuring this exposure.""";30;06.03.2018;3
Advisen18;Ben Hobby; RGL Forensics;"""When Systems Stop Working: Measuring Business Interruption Exposures""";"""The increased reliance on technology within the connected economy has spawned new and more complex exposures.  Identifying, measuring and managing Business Interruption and Contingent Business Interruption exposures has become a critical need.  Leading providers will discuss the development of new techniques for measuring this exposure.""";30;06.03.2018;3
Advisen18;Ward Spangenberg; Cyber adAPT (Moderator);"""Best Foot Forward: Presenting your Company to the Insurance Market""";"""As you approach the insurance market to buy cyber insurance, how do you make your business and its cyber risk management stand out from the crowd? This session will prepare you for interactions with insurance market, offering practical tips on how to differentiate your cyber application to optimize your purchase.""";30;06.03.2018;3
Advisen18;Erica Constance; QBE European Operations;"""Best Foot Forward: Presenting your Company to the Insurance Market""";"""As you approach the insurance market to buy cyber insurance, how do you make your business and its cyber risk management stand out from the crowd? This session will prepare you for interactions with insurance market, offering practical tips on how to differentiate your cyber application to optimize your purchase.""";30;06.03.2018;3
Advisen18;Sarah Neild; Marsh;"""Best Foot Forward: Presenting your Company to the Insurance Market""";"""As you approach the insurance market to buy cyber insurance, how do you make your business and its cyber risk management stand out from the crowd? This session will prepare you for interactions with insurance market, offering practical tips on how to differentiate your cyber application to optimize your purchase.""";30;06.03.2018;3
Advisen18;Dr Jason R C Nurse; University of Oxford;"""Afternoon Keynote Address""";"""?""";30;06.03.2018;1
Advisen18;Bob Parisi; Marsh (Moderator);"""The Future of Cyber Insurance""";"""A panel of experts will talk about where the cyber product is going and how it will be structured.""";60;06.03.2018;4
Advisen18;Lyndsey Bauer; Paragon International Insurance Brokers Ltd;"""The Future of Cyber Insurance""";"""A panel of experts will talk about where the cyber product is going and how it will be structured.""";60;06.03.2018;4
Advisen18;Graeme Newman; CFC Underwriting;"""The Future of Cyber Insurance""";"""A panel of experts will talk about where the cyber product is going and how it will be structured.""";60;06.03.2018;4
Advisen18;Dan Trueman; AXIS Insurance;"""The Future of Cyber Insurance""";"""A panel of experts will talk about where the cyber product is going and how it will be structured.""";60;06.03.2018;4
Advisen17;Jacqueline Spencer-Sim; Novae;"""Opening Remarks by our 2017 Conference Co-Chairs""";"""?""";10;07.03.2017;2
Advisen17;Sarah Stephens; JLT Specialty;"""Opening Remarks by our 2017 Conference Co-Chairs""";"""?""";10;07.03.2017;2
Advisen17;General Sir Richard Barrons KCB CBE;Joint Forces Command 2013-2016;"""Keynote Address""";"""?""";30;07.03.2017;1
Advisen17;Sarah Stephens; JLT Specialty (Moderator);"""Buyers Perspective""";"""A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;07.03.2017;4
Advisen17;Philippe Cotelle; Airbus Defence and Space;"""Buyers Perspective""";"""A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;07.03.2017;4
Advisen17;Emily Jenner; Standard Chartered Bank;"""Buyers Perspective""";"""A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;07.03.2017;4
Advisen17;Alan Kurth; Marsh & McLennan Companies;"""Buyers Perspective""";"""A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.""";45;07.03.2017;4
Advisen17;Tim Stapleton; Cyber/Tech Product Manager Chubb (Moderator);"""How to identify cyber risk in your organization:""";"""As the internet is becoming less of a ‘flat surface’ and more of a web that works around us, what new threats and risks are posed to your organisation? This session will address new technologies and how they are shaping the risk landscape. Panelists will discuss technologies, workflow issues, such as supply chain management and the Insider Threat posed by your own employees. This session is sponsored by FICO.""";45;07.03.2017;4
Advisen17;John Boles; Navigant;"""How to identify cyber risk in your organization:""";"""As the internet is becoming less of a ‘flat surface’ and more of a web that works around us, what new threats and risks are posed to your organisation? This session will address new technologies and how they are shaping the risk landscape. Panelists will discuss technologies, workflow issues, such as supply chain management and the Insider Threat posed by your own employees. This session is sponsored by FICO.""";45;07.03.2017;4
Advisen17;Manish Karir; FICO;"""How to identify cyber risk in your organization:""";"""As the internet is becoming less of a ‘flat surface’ and more of a web that works around us, what new threats and risks are posed to your organisation? This session will address new technologies and how they are shaping the risk landscape. Panelists will discuss technologies, workflow issues, such as supply chain management and the Insider Threat posed by your own employees. This session is sponsored by FICO.""";45;07.03.2017;4
Advisen17;Mark Lopes; Liberty Advisor Group;"""How to identify cyber risk in your organization:""";"""As the internet is becoming less of a ‘flat surface’ and more of a web that works around us, what new threats and risks are posed to your organisation? This session will address new technologies and how they are shaping the risk landscape. Panelists will discuss technologies, workflow issues, such as supply chain management and the Insider Threat posed by your own employees. This session is sponsored by FICO.""";45;07.03.2017;4
Advisen17;Max Perkins; Lockton Companies LLP (Moderator);"""Breaking the Mould – How New Exposures are Shaping the Insurance Industry""";"""Is the concept of ‘cyber insurance’ already becoming outdated? As technologies evolve, the risk landscape is transforming – with profound effects on the traditional insurance business model. This session will look at new risks – what is covered and what is not covered by cyber insurance? This session will explore how the insurance sector is responding with changes in business models and product initiatives.""";45;07.03.2017;4
Advisen17;Russell Kirby; FM Global;"""Breaking the Mould – How New Exposures are Shaping the Insurance Industry""";"""Is the concept of ‘cyber insurance’ already becoming outdated? As technologies evolve, the risk landscape is transforming – with profound effects on the traditional insurance business model. This session will look at new risks – what is covered and what is not covered by cyber insurance? This session will explore how the insurance sector is responding with changes in business models and product initiatives.""";45;07.03.2017;4
Advisen17;Geoff Pryor-White; Tarian Agency Limited;"""Breaking the Mould – How New Exposures are Shaping the Insurance Industry""";"""Is the concept of ‘cyber insurance’ already becoming outdated? As technologies evolve, the risk landscape is transforming – with profound effects on the traditional insurance business model. This session will look at new risks – what is covered and what is not covered by cyber insurance? This session will explore how the insurance sector is responding with changes in business models and product initiatives.""";45;07.03.2017;4
Advisen17;Juliet White; XL Catlin;"""Breaking the Mould – How New Exposures are Shaping the Insurance Industry""";"""Is the concept of ‘cyber insurance’ already becoming outdated? As technologies evolve, the risk landscape is transforming – with profound effects on the traditional insurance business model. This session will look at new risks – what is covered and what is not covered by cyber insurance? This session will explore how the insurance sector is responding with changes in business models and product initiatives.""";45;07.03.2017;4
Advisen17;Matthew Hogg; Strategic Assets Liberty Specialty Markets (Moderator);"""How do you quantify cyber threats in your organization?""";"""This session will offer some practical tips on how to quantify cyber exposures and risk. Where can you go to find out? How do you distinguish between the various tools available? The panel will explain the regulatory and compliance landscape – outlining what standards and frameworks are in place and how to employ them in your business.""";60;07.03.2017;5
Advisen17;Neil Hare-Brown; STORM Guidance;"""How do you quantify cyber threats in your organization?""";"""This session will offer some practical tips on how to quantify cyber exposures and risk. Where can you go to find out? How do you distinguish between the various tools available? The panel will explain the regulatory and compliance landscape – outlining what standards and frameworks are in place and how to employ them in your business.""";60;07.03.2017;5
Advisen17;Ryan Jones; BMS Group;"""How do you quantify cyber threats in your organization?""";"""This session will offer some practical tips on how to quantify cyber exposures and risk. Where can you go to find out? How do you distinguish between the various tools available? The panel will explain the regulatory and compliance landscape – outlining what standards and frameworks are in place and how to employ them in your business.""";60;07.03.2017;5
Advisen17;Winston Krone; Kivu;"""How do you quantify cyber threats in your organization?""";"""This session will offer some practical tips on how to quantify cyber exposures and risk. Where can you go to find out? How do you distinguish between the various tools available? The panel will explain the regulatory and compliance landscape – outlining what standards and frameworks are in place and how to employ them in your business.""";60;07.03.2017;5
Advisen17;Bret Padres; The Crypsis Group;"""How do you quantify cyber threats in your organization?""";"""This session will offer some practical tips on how to quantify cyber exposures and risk. Where can you go to find out? How do you distinguish between the various tools available? The panel will explain the regulatory and compliance landscape – outlining what standards and frameworks are in place and how to employ them in your business.""";60;07.03.2017;5
Advisen17;Patrick Bousfield; Capsicum Re (Moderator);"""Exposure Management in the Insurance Sector""";"""The PRA is focusing on aggregation potential from ‘silent’ cyber exposures, including from the IoT and widespread use of the Cloud. The recent Dyn attack in the US has highlighted how cyber attacks can proliferate in unexpected ways. How is the insurance industry tackling aggregation? Is the solution robust enough?""";60;07.03.2017;6
Advisen17;Nick Beecroft; Sciemus;"""Exposure Management in the Insurance Sector""";"""The PRA is focusing on aggregation potential from ‘silent’ cyber exposures, including from the IoT and widespread use of the Cloud. The recent Dyn attack in the US has highlighted how cyber attacks can proliferate in unexpected ways. How is the insurance industry tackling aggregation? Is the solution robust enough?""";60;07.03.2017;6
Advisen17;Oliver Brew; Aspen Insurance;"""Exposure Management in the Insurance Sector""";"""The PRA is focusing on aggregation potential from ‘silent’ cyber exposures, including from the IoT and widespread use of the Cloud. The recent Dyn attack in the US has highlighted how cyber attacks can proliferate in unexpected ways. How is the insurance industry tackling aggregation? Is the solution robust enough?""";60;07.03.2017;6
Advisen17;Rory Egan; MunichRe;"""Exposure Management in the Insurance Sector""";"""The PRA is focusing on aggregation potential from ‘silent’ cyber exposures, including from the IoT and widespread use of the Cloud. The recent Dyn attack in the US has highlighted how cyber attacks can proliferate in unexpected ways. How is the insurance industry tackling aggregation? Is the solution robust enough?""";60;07.03.2017;6
Advisen17;Ashwin Kashyap; Symantec;"""Exposure Management in the Insurance Sector""";"""The PRA is focusing on aggregation potential from ‘silent’ cyber exposures, including from the IoT and widespread use of the Cloud. The recent Dyn attack in the US has highlighted how cyber attacks can proliferate in unexpected ways. How is the insurance industry tackling aggregation? Is the solution robust enough?""";60;07.03.2017;6
Advisen17;Scott Stransky; AIR Worldwide;"""Exposure Management in the Insurance Sector""";"""The PRA is focusing on aggregation potential from ‘silent’ cyber exposures, including from the IoT and widespread use of the Cloud. The recent Dyn attack in the US has highlighted how cyber attacks can proliferate in unexpected ways. How is the insurance industry tackling aggregation? Is the solution robust enough?""";60;07.03.2017;6
Advisen17;Erica Constance; Paragon International Insurance Brokers Ltd (Moderator);"""What is covered under a cyber policy?""";"""This session will outline the covers under a cyber insurance policy and look at some of the ways it is changing. The panel will address issues such as extortion, social engineering, online payment schemes and reputational issues.""";45;07.03.2017;4
Advisen17;Laila Khudairi; Tokio Marine Kiln;"""What is covered under a cyber policy?""";"""This session will outline the covers under a cyber insurance policy and look at some of the ways it is changing. The panel will address issues such as extortion, social engineering, online payment schemes and reputational issues.""";45;07.03.2017;4
Advisen17;Edward Smerdon;Sedgwick / Detert / Moran & Arnold LLP;"""What is covered under a cyber policy?""";"""This session will outline the covers under a cyber insurance policy and look at some of the ways it is changing. The panel will address issues such as extortion, social engineering, online payment schemes and reputational issues.""";45;07.03.2017;4
Advisen17;Matthew Webb; Hiscox;"""What is covered under a cyber policy?""";"""This session will outline the covers under a cyber insurance policy and look at some of the ways it is changing. The panel will address issues such as extortion, social engineering, online payment schemes and reputational issues.""";45;07.03.2017;4
Advisen17;Bob Parisi; Marsh (Moderator);"""Art versus Science""";"""How do carriers assess a ‘good risk’? This session will discuss the increased application of technology in the traditional underwriting process. Investment in Insurance Technology start-ups is at an all-time high. What impact will this development have on the underwriting process? The panel will look at synergies and conflicts between vendor tools and the application process and ask how intrusive the underwriting process should be.""";45;07.03.2017;4
Advisen17;Roger Francis; Mandiant;"""Art versus Science""";"""How do carriers assess a ‘good risk’? This session will discuss the increased application of technology in the traditional underwriting process. Investment in Insurance Technology start-ups is at an all-time high. What impact will this development have on the underwriting process? The panel will look at synergies and conflicts between vendor tools and the application process and ask how intrusive the underwriting process should be.""";45;07.03.2017;4
Advisen17;Jacob Olcott; BitSight Technologies;"""Art versus Science""";"""How do carriers assess a ‘good risk’? This session will discuss the increased application of technology in the traditional underwriting process. Investment in Insurance Technology start-ups is at an all-time high. What impact will this development have on the underwriting process? The panel will look at synergies and conflicts between vendor tools and the application process and ask how intrusive the underwriting process should be.""";45;07.03.2017;4
Advisen17;Dan Trueman; Novae;"""Art versus Science""";"""How do carriers assess a ‘good risk’? This session will discuss the increased application of technology in the traditional underwriting process. Investment in Insurance Technology start-ups is at an all-time high. What impact will this development have on the underwriting process? The panel will look at synergies and conflicts between vendor tools and the application process and ask how intrusive the underwriting process should be.""";45;07.03.2017;4
Advisen17;David Bradford; Advisen (Moderator);"""Engaging the C-suite: How to get buy-in for insurance?""";"""Increasingly, the Board of Directors and the CISO are involved in insurance-buying decisions. How do you engage the various stakeholders to make risk transfer decisions?""";30;07.03.2017;3
Advisen17;Michael Bruemmer; Experian;"""Engaging the C-suite: How to get buy-in for insurance?""";"""Increasingly, the Board of Directors and the CISO are involved in insurance-buying decisions. How do you engage the various stakeholders to make risk transfer decisions?""";30;07.03.2017;3
Advisen17;Wendel Verbeek; Brunswick Group;"""Engaging the C-suite: How to get buy-in for insurance?""";"""Increasingly, the Board of Directors and the CISO are involved in insurance-buying decisions. How do you engage the various stakeholders to make risk transfer decisions?""";30;07.03.2017;3
Advisen17;Vince Vitkowsky; Seiger Gfeller Laurie LLP (Moderator);"""Communication and Confidentiality – The Privacy Debate""";"""Speakers will discuss the types of information shared between insurer and buyer and address confidentiality. How do you establish a trusted dialogue between buyer and insurer? How confidential is the claims notification process? What’s the right amount of information to enable underwriters to tailor-make coverage to a buyer’s needs?""";30;07.03.2017;3
Advisen17;Phil Mayes; Talbot Underwriting;"""Communication and Confidentiality – The Privacy Debate""";"""Speakers will discuss the types of information shared between insurer and buyer and address confidentiality. How do you establish a trusted dialogue between buyer and insurer? How confidential is the claims notification process? What’s the right amount of information to enable underwriters to tailor-make coverage to a buyer’s needs?""";30;07.03.2017;3
Advisen17;Margaret Murphy; CFC;"""Communication and Confidentiality – The Privacy Debate""";"""Speakers will discuss the types of information shared between insurer and buyer and address confidentiality. How do you establish a trusted dialogue between buyer and insurer? How confidential is the claims notification process? What’s the right amount of information to enable underwriters to tailor-make coverage to a buyer’s needs?""";30;07.03.2017;3
Advisen17;Hans Allnutt; DAC Beachcroft LLP (Moderator);"""Claims and Volatility""";"""How many claims are being made – and paid – under insurance policies? How does claims activity affect the availability of insurance cover? This session will address claims trends and discuss how to explain volatility to buyers.""";45;07.03.2017;5
Advisen17;Noona Barlow; AIG;"""Claims and Volatility""";"""How many claims are being made – and paid – under insurance policies? How does claims activity affect the availability of insurance cover? This session will address claims trends and discuss how to explain volatility to buyers.""";45;07.03.2017;5
Advisen17;James Burns; CFC;"""Claims and Volatility""";"""How many claims are being made – and paid – under insurance policies? How does claims activity affect the availability of insurance cover? This session will address claims trends and discuss how to explain volatility to buyers.""";45;07.03.2017;5
Advisen17;Ben Hobby; RGL Forensics;"""Claims and Volatility""";"""How many claims are being made – and paid – under insurance policies? How does claims activity affect the availability of insurance cover? This session will address claims trends and discuss how to explain volatility to buyers.""";45;07.03.2017;5
Advisen17;Glyn Thoms; Willis Towers Watson;"""Claims and Volatility""";"""How many claims are being made – and paid – under insurance policies? How does claims activity affect the availability of insurance cover? This session will address claims trends and discuss how to explain volatility to buyers.""";45;07.03.2017;5
Advisen17;Jacqueline Spencer-Sim; Novae (Moderator);"""Reaching Capacity?""";"""This session will look at insurance buying trends and address available capacity in the insurance market. How much cyber insurance should you buy? Is there enough capacity? Is the market profitable and sustainable?""";45;07.03.2017;4
Advisen17;Alec Cramsie; Beazley;"""Reaching Capacity?""";"""This session will look at insurance buying trends and address available capacity in the insurance market. How much cyber insurance should you buy? Is there enough capacity? Is the market profitable and sustainable?""";45;07.03.2017;4
Advisen17;Jack Lyons; JLT Specialty;"""Reaching Capacity?""";"""This session will look at insurance buying trends and address available capacity in the insurance market. How much cyber insurance should you buy? Is there enough capacity? Is the market profitable and sustainable?""";45;07.03.2017;4
Advisen17;Peter Schwartz; Holman Fenwick Willan LLP;"""Reaching Capacity?""";"""This session will look at insurance buying trends and address available capacity in the insurance market. How much cyber insurance should you buy? Is there enough capacity? Is the market profitable and sustainable?""";45;07.03.2017;4
Advisen16;Matthew Hogg;Liberty Specialty Markets;"""Remarks from our 2016 Conference Chair""";"""?""";10;09.02.2016;1
Advisen16;Sir Tim McClement KCB / OBE;PGI Ltd;"""Keynote Address""";"""?""";30;09.02.2016;1
Advisen16;John Scott ;Zurich Insurance Group;"""What will the future of cyber risk look like?""";"""The globalization of value chains, increased financial integration, rapid urbanization, and the Internet’s ubiquity have all accelerated worldwide economic growth over the past few decades. Unfortunately, these same developments have also significantly increased our vulnerability to external shocks and global crises. With risks mounting and traditional systems of control weakening, now is the time to ask: do the risks of being connected outweigh the benefits to global economic growth?""";15;09.02.2016;1
Advisen16;Sarah Stephens; JLT Specialty (Moderator);"""The Risk Manager’s Perspective""";"""How do businesses quantify and qualify their cyber threats? Before businesses can deploy capital to addressing risks, they first need to know what they are and how they can affect operations. This session will look into how risk managers assess their risks and outline some best practices.""";45;09.02.2016;3
Advisen16;Philippe Cotelle; Airbus Defence and Space;"""The Risk Manager’s Perspective""";"""How do businesses quantify and qualify their cyber threats? Before businesses can deploy capital to addressing risks, they first need to know what they are and how they can affect operations. This session will look into how risk managers assess their risks and outline some best practices.""";45;09.02.2016;3
Advisen16;Julia Graham; Airmic;"""The Risk Manager’s Perspective""";"""How do businesses quantify and qualify their cyber threats? Before businesses can deploy capital to addressing risks, they first need to know what they are and how they can affect operations. This session will look into how risk managers assess their risks and outline some best practices.""";45;09.02.2016;3
Advisen16;Jim Blinn ;Advisen;"""Real Claims Trends""";"""Does the reality of cyber loss experience match the topics discussed at most conferences? Much time is spent discussing data breach, but is that what is keeping underwriters up at night? This session will outline where the actual claims are coming from – intellectual property theft, E&O, media liability, etc. Is the loss trend shifting? How is it affecting carrier pricing models and driving pricing and underwriting controls?""";30;09.02.2016;1
Advisen16;Erica Constance; Paragon Brokers (Moderator);"""The Forensic Dissection of a Claim""";"""You only really find out what you’ve bought when you have a claim. This session will use case studies to assess how a cyber claim works in reality. What is the role of the traditional loss adjuster? How do buyers access the services available under a policy? Which services offer the most effective application of the policy limit?""";60;09.02.2016;6
Advisen16;Hans Allnutt; DAC Beachcroft LLP;"""The Forensic Dissection of a Claim""";"""You only really find out what you’ve bought when you have a claim. This session will use case studies to assess how a cyber claim works in reality. What is the role of the traditional loss adjuster? How do buyers access the services available under a policy? Which services offer the most effective application of the policy limit?""";60;09.02.2016;6
Advisen16;James Berry; Brit Global Cyber Privacy & Technology;"""The Forensic Dissection of a Claim""";"""You only really find out what you’ve bought when you have a claim. This session will use case studies to assess how a cyber claim works in reality. What is the role of the traditional loss adjuster? How do buyers access the services available under a policy? Which services offer the most effective application of the policy limit?""";60;09.02.2016;6
Advisen16;Sandra Cole; Beazley Group;"""The Forensic Dissection of a Claim""";"""You only really find out what you’ve bought when you have a claim. This session will use case studies to assess how a cyber claim works in reality. What is the role of the traditional loss adjuster? How do buyers access the services available under a policy? Which services offer the most effective application of the policy limit?""";60;09.02.2016;6
Advisen16;Neil Hare-Brown; STORM Guidance;"""The Forensic Dissection of a Claim""";"""You only really find out what you’ve bought when you have a claim. This session will use case studies to assess how a cyber claim works in reality. What is the role of the traditional loss adjuster? How do buyers access the services available under a policy? Which services offer the most effective application of the policy limit?""";60;09.02.2016;6
Advisen16;Kari A. Timm; BatesCarey LLP;"""The Forensic Dissection of a Claim""";"""You only really find out what you’ve bought when you have a claim. This session will use case studies to assess how a cyber claim works in reality. What is the role of the traditional loss adjuster? How do buyers access the services available under a policy? Which services offer the most effective application of the policy limit?""";60;09.02.2016;6
Advisen16;Nick Beecroft; Lloyd’s (Moderator);"""Harnessing the Numbers""";"""Is it possible to quantify the threat of cyber risks to a business? With Lloyd’s driving the quantification of cyber risk, this is becoming a business imperative in the London market. This session will look at the factors that contribute to the cost of a cyber loss and various initiatives to model cyber risk, including how to quantify and manage systemic risk and aggregations of exposures.""";90;09.02.2016;6
Advisen16;Neil Arklie; Swiss Re;"""Harnessing the Numbers""";"""Is it possible to quantify the threat of cyber risks to a business? With Lloyd’s driving the quantification of cyber risk, this is becoming a business imperative in the London market. This session will look at the factors that contribute to the cost of a cyber loss and various initiatives to model cyber risk, including how to quantify and manage systemic risk and aggregations of exposures.""";90;09.02.2016;6
Advisen16;Daljitt Barn; Munich Re;"""Harnessing the Numbers""";"""Is it possible to quantify the threat of cyber risks to a business? With Lloyd’s driving the quantification of cyber risk, this is becoming a business imperative in the London market. This session will look at the factors that contribute to the cost of a cyber loss and various initiatives to model cyber risk, including how to quantify and manage systemic risk and aggregations of exposures.""";90;09.02.2016;6
Advisen16;Stephen Boyer; BitSight;"""Harnessing the Numbers""";"""Is it possible to quantify the threat of cyber risks to a business? With Lloyd’s driving the quantification of cyber risk, this is becoming a business imperative in the London market. This session will look at the factors that contribute to the cost of a cyber loss and various initiatives to model cyber risk, including how to quantify and manage systemic risk and aggregations of exposures.""";90;09.02.2016;6
Advisen16;Alastair Mole; Willis Re;"""Harnessing the Numbers""";"""Is it possible to quantify the threat of cyber risks to a business? With Lloyd’s driving the quantification of cyber risk, this is becoming a business imperative in the London market. This session will look at the factors that contribute to the cost of a cyber loss and various initiatives to model cyber risk, including how to quantify and manage systemic risk and aggregations of exposures.""";90;09.02.2016;6
Advisen16;Scott Stransky; AIR;"""Harnessing the Numbers""";"""Is it possible to quantify the threat of cyber risks to a business? With Lloyd’s driving the quantification of cyber risk, this is becoming a business imperative in the London market. This session will look at the factors that contribute to the cost of a cyber loss and various initiatives to model cyber risk, including how to quantify and manage systemic risk and aggregations of exposures.""";90;09.02.2016;6
Advisen16;Dan Trueman; Novae;"""Is cyber accurately priced""";"""How is cyber priced in a changing market? Is it adequate? This session will draw perspectives from different carriers in the US primary, excess, London and Bermuda markets. The panel will outline how they price cyber risk and address the thorny issue of adequacy.""";30;09.02.2016;2
Advisen16;William Wright; Paragon Brokers;"""Is cyber accurately priced""";"""How is cyber priced in a changing market? Is it adequate? This session will draw perspectives from different carriers in the US primary, excess, London and Bermuda markets. The panel will outline how they price cyber risk and address the thorny issue of adequacy.""";30;09.02.2016;2
Advisen16;Rebecca Bole; Advisen (Moderator);"""Should property market cover physical damage?""";"""These two speakers will discuss whether a property policy should cover cyber losses. They will explore some of the grey areas in current policies, if/how BI and CBI losses are addressed and how to avoid gaps for cyber-related physical damage losses.""";30;09.02.2016;5
Advisen16;Matthew Hogg; Liberty Specialty Markets;"""Should property market cover physical damage?""";"""These two speakers will discuss whether a property policy should cover cyber losses. They will explore some of the grey areas in current policies, if/how BI and CBI losses are addressed and how to avoid gaps for cyber-related physical damage losses.""";30;09.02.2016;5
Advisen16;Russell Kennedy; Brit Insurance;"""Should property market cover physical damage?""";"""These two speakers will discuss whether a property policy should cover cyber losses. They will explore some of the grey areas in current policies, if/how BI and CBI losses are addressed and how to avoid gaps for cyber-related physical damage losses.""";30;09.02.2016;5
Advisen16;Ben Nicholls; Aon Benfield;"""Should property market cover physical damage?""";"""These two speakers will discuss whether a property policy should cover cyber losses. They will explore some of the grey areas in current policies, if/how BI and CBI losses are addressed and how to avoid gaps for cyber-related physical damage losses.""";30;09.02.2016;5
Advisen16;Andreas Schlayer; Munich Re;"""Should property market cover physical damage?""";"""These two speakers will discuss whether a property policy should cover cyber losses. They will explore some of the grey areas in current policies, if/how BI and CBI losses are addressed and how to avoid gaps for cyber-related physical damage losses.""";30;09.02.2016;5
Advisen16;Simon Milner; Miller Insurance;"""Should cyber terrorism be shouldered by the insurance market?""";"""Is there a need for a government backstop?""";30;09.02.2016;2
Advisen16;Max Perkins; Lockton Companies LLP;"""Should cyber terrorism be shouldered by the insurance market?""";"""Is there a need for a government backstop?""";30;09.02.2016;2
Advisen16;Cinthia Motley; Sedgwick LLP (Moderator);"""A Big Year for Regulation""";"""How does the landscape look for data liabilities in 2016? NIS, GDPR, and the Parliamentary Inquiry on Talk Talk will all change the liabilities of businesses with regard to data management. This session will outline some of the major changes and look at their implications.""";45;09.02.2016;5
Advisen16;Raluca Boroianu-Omura; Association of British Insurers (ABI);"""A Big Year for Regulation""";"""How does the landscape look for data liabilities in 2016? NIS, GDPR, and the Parliamentary Inquiry on Talk Talk will all change the liabilities of businesses with regard to data management. This session will outline some of the major changes and look at their implications.""";45;09.02.2016;5
Advisen16;Michael Bruemmer; Experian;"""A Big Year for Regulation""";"""How does the landscape look for data liabilities in 2016? NIS, GDPR, and the Parliamentary Inquiry on Talk Talk will all change the liabilities of businesses with regard to data management. This session will outline some of the major changes and look at their implications.""";45;09.02.2016;5
Advisen16;Laurent Heslault; Symantec;"""A Big Year for Regulation""";"""How does the landscape look for data liabilities in 2016? NIS, GDPR, and the Parliamentary Inquiry on Talk Talk will all change the liabilities of businesses with regard to data management. This session will outline some of the major changes and look at their implications.""";45;09.02.2016;5
Advisen16;Bridget Treacy; Hunton & Williams LLP;"""A Big Year for Regulation""";"""How does the landscape look for data liabilities in 2016? NIS, GDPR, and the Parliamentary Inquiry on Talk Talk will all change the liabilities of businesses with regard to data management. This session will outline some of the major changes and look at their implications.""";45;09.02.2016;5
Advisen16;Andrew Hill; Hill Dickinson LLP (Moderator);"""Data Liabilities and Insurance""";"""Taking the new data liability landscape, where should these exposures fit into insurance products? Should standalone cyber cover these risks, or should they sit within existing policies? If the latter, how can cyber insurance experts assist in quantifying and rating those exposures?""";45;09.02.2016;4
Advisen16;Mark Camillo; AIG;"""Data Liabilities and Insurance""";"""Taking the new data liability landscape, where should these exposures fit into insurance products? Should standalone cyber cover these risks, or should they sit within existing policies? If the latter, how can cyber insurance experts assist in quantifying and rating those exposures?""";45;09.02.2016;4
Advisen16;Ben Maidment; Brit Global Specialty;"""Data Liabilities and Insurance""";"""Taking the new data liability landscape, where should these exposures fit into insurance products? Should standalone cyber cover these risks, or should they sit within existing policies? If the latter, how can cyber insurance experts assist in quantifying and rating those exposures?""";45;09.02.2016;4
Advisen16;James Tuplin; QBE;"""Data Liabilities and Insurance""";"""Taking the new data liability landscape, where should these exposures fit into insurance products? Should standalone cyber cover these risks, or should they sit within existing policies? If the latter, how can cyber insurance experts assist in quantifying and rating those exposures?""";45;09.02.2016;4
Advisen16;Stephen Wares; Marsh (Moderator);"""Is the Cyber Market Fit for Purpose?""";"""Is the Cyber market fit for purpose? Is there a disconnect between boardroom perceptions of the adequacy of insurance cover for cyber risks and the reality? This session looks at the risks businesses are seeking to transfer to insurance and discusses the practicalities of a full response from the insurance market. Panelists will also discuss where cyber cover could lie in existing policies and whether policy wordings are keeping up with the pace of change in exposures, such as operational risk. the skills available in the insurance sector to adequately assess and price risk and the importance of building relationships between insurance and business to ensure the market is fit for purpose.""";45;09.02.2016;4
Advisen16;Graeme Newman; CFC;"""Is the Cyber Market Fit for Purpose?""";"""Is the Cyber market fit for purpose? Is there a disconnect between boardroom perceptions of the adequacy of insurance cover for cyber risks and the reality? This session looks at the risks businesses are seeking to transfer to insurance and discusses the practicalities of a full response from the insurance market. Panelists will also discuss where cyber cover could lie in existing policies and whether policy wordings are keeping up with the pace of change in exposures, such as operational risk. the skills available in the insurance sector to adequately assess and price risk and the importance of building relationships between insurance and business to ensure the market is fit for purpose.""";45;09.02.2016;4
Advisen16;Michael Schmitt; Swiss Re Corporate Solutions;"""Is the Cyber Market Fit for Purpose?""";"""Is the Cyber market fit for purpose? Is there a disconnect between boardroom perceptions of the adequacy of insurance cover for cyber risks and the reality? This session looks at the risks businesses are seeking to transfer to insurance and discusses the practicalities of a full response from the insurance market. Panelists will also discuss where cyber cover could lie in existing policies and whether policy wordings are keeping up with the pace of change in exposures, such as operational risk. the skills available in the insurance sector to adequately assess and price risk and the importance of building relationships between insurance and business to ensure the market is fit for purpose.""";45;09.02.2016;4
Advisen16;Tim Stapleton; ACE;"""Is the Cyber Market Fit for Purpose?""";"""Is the Cyber market fit for purpose? Is there a disconnect between boardroom perceptions of the adequacy of insurance cover for cyber risks and the reality? This session looks at the risks businesses are seeking to transfer to insurance and discusses the practicalities of a full response from the insurance market. Panelists will also discuss where cyber cover could lie in existing policies and whether policy wordings are keeping up with the pace of change in exposures, such as operational risk. the skills available in the insurance sector to adequately assess and price risk and the importance of building relationships between insurance and business to ensure the market is fit for purpose.""";45;09.02.2016;4
Advisen16;Melissa Ventrone; Wilson Elser (Moderator);"""Cyber War Game""";"""The military does it, the government does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. Ahead of our conference, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London.""";45;09.02.2016;4
Advisen16;Charlie Howard; Burson-Marsteller;"""Cyber War Game""";"""The military does it, the government does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. Ahead of our conference, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London.""";45;09.02.2016;4
Advisen16;Ashley Hurst; Olswang LLP;"""Cyber War Game""";"""The military does it, the government does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. Ahead of our conference, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London.""";45;09.02.2016;4
Advisen16;Winston Krone; Kivu Consulting;"""Cyber War Game""";"""The military does it, the government does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. Ahead of our conference, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London.""";45;09.02.2016;4
Advisen15;Bill Keogh;Advisen;"""Welcoming Remarks""";"""?""";5;10.02.2015;1
Advisen15;Graeme Newman;CFC Underwriting;"""Opening Chairman’s Remarks""";"""?""";15;10.02.2015;1
Advisen15;Brian Lord;PGI Cyber;"""Keynote Address""";"""?""";45;10.02.2015;1
Advisen15;Jim Blinn;Advisen;"""Cyber Market Metrics""";"""Cyber risk is one of the most dynamic and fast-growing segments of the insurance market, but it is one that poses a wide array of challenges to both risk managers and underwriters. New capacity is being attracted to the market even as losses mount and underwriting variables grow in both number and complexity. This session will examine the forces shaping the cyber risk market and how they influence capacity, pricing, profitability, growth rates, product innovation, and competition. Data will be drawn substantially from Advisen’s proprietary cyber loss and insurance program databases, with insight and commentary provided by a leading cyber risk market expert.""";20;10.02.2015;1
Advisen15;Jeremy Smith;Zurich;"""“The Survey Says”""";"""Zurich’s Jeremy Smith will present the results of research – sponsored by Zurich and produced by Advisen – based on a survey of European Risk Managers and Insurance Buyers and illustrates the extent by which executives and board members view the relative seriousness of various cyber risk threats. How are businesses addressing their cyber risk management needs? How do businesses choosing between retaining the residual risk of a cyber-security breach or transferring it through the purchase of insurance?""";15;10.02.2015;1
Advisen15;Jimaan Sane; Beazley (Moderator);"""The Risk Management Perspective""";"""A panel of risk management experts discuss how cyber exposures fit into a broader risk management framework and the role of insurance in addressing these exposures. Panelists will delve into the decision-making process and examine the factors that shape the buying decision.""";45;10.02.2015;4
Advisen15;Jonathan Armstrong; Cordery;"""The Risk Management Perspective""";"""A panel of risk management experts discuss how cyber exposures fit into a broader risk management framework and the role of insurance in addressing these exposures. Panelists will delve into the decision-making process and examine the factors that shape the buying decision.""";45;10.02.2015;4
Advisen15;Alan Jenkins; Cyber Security Pilotage Ltd;"""The Risk Management Perspective""";"""A panel of risk management experts discuss how cyber exposures fit into a broader risk management framework and the role of insurance in addressing these exposures. Panelists will delve into the decision-making process and examine the factors that shape the buying decision.""";45;10.02.2015;4
Advisen15;Ali Murphy; TSB Bank;"""The Risk Management Perspective""";"""A panel of risk management experts discuss how cyber exposures fit into a broader risk management framework and the role of insurance in addressing these exposures. Panelists will delve into the decision-making process and examine the factors that shape the buying decision.""";45;10.02.2015;4
Advisen15;Stephen Wares; Marsh (Moderator);"""Insurance Coverage and Coverage Issues""";"""What will cyber insurance look like in the future? Will stand-alone Cyber Risk cover continue to make sense? This panel discussion will delve into insurance coverage to review recent underwriting developments and how this cover is evolving. For example, are policy wordings keeping up with the pace of change in exposures?""";45;10.02.2015;4
Advisen15;Francois Brisson; Swiss Re Corporate Solutions;"""Insurance Coverage and Coverage Issues""";"""What will cyber insurance look like in the future? Will stand-alone Cyber Risk cover continue to make sense? This panel discussion will delve into insurance coverage to review recent underwriting developments and how this cover is evolving. For example, are policy wordings keeping up with the pace of change in exposures?""";45;10.02.2015;4
Advisen15;Lisa Hansford-Smith; XL Insurance Company;"""Insurance Coverage and Coverage Issues""";"""What will cyber insurance look like in the future? Will stand-alone Cyber Risk cover continue to make sense? This panel discussion will delve into insurance coverage to review recent underwriting developments and how this cover is evolving. For example, are policy wordings keeping up with the pace of change in exposures?""";45;10.02.2015;4
Advisen15;William Wright; Paragon;"""Insurance Coverage and Coverage Issues""";"""What will cyber insurance look like in the future? Will stand-alone Cyber Risk cover continue to make sense? This panel discussion will delve into insurance coverage to review recent underwriting developments and how this cover is evolving. For example, are policy wordings keeping up with the pace of change in exposures?""";45;10.02.2015;4
Advisen15;Graeme Newman;CFC Underwriting;"""Opening Afternoon Remarks""";"""""";5;10.02.2015;1
Advisen15;Bridget Treacy; Hunton & Williams;"""Regulatory Landscape Update""";"""This presentation will provide an update on European cyber regulation. This year has seen landmark privacy rulings (eg the right to be forgotten) and legislation around data processing. However, Europe holds its breath for the crucial next 12-24 months as the EU decides on a major regulatory overhaul.""";25;10.02.2015;2
Advisen15;Steve Wright; Unilever;"""Regulatory Landscape Update""";"""This presentation will provide an update on European cyber regulation. This year has seen landmark privacy rulings (eg the right to be forgotten) and legislation around data processing. However, Europe holds its breath for the crucial next 12-24 months as the EU decides on a major regulatory overhaul.""";25;10.02.2015;2
Advisen15;Graeme Newman; CFC Underwriting (Moderator);"""Business Interruption""";"""The recent Sony Pictures breach in the US has catapulted the potential impact of a cyber event on operations to the top of the corporate agenda. This panel discussion will explore the impact of an event on business interruption, supply chain and operational risks. The panelists will also explore the insurance implications of physical damage cover.""";45;10.02.2015;5
Advisen15;Mark Bannon; Zurich;"""Business Interruption""";"""The recent Sony Pictures breach in the US has catapulted the potential impact of a cyber event on operations to the top of the corporate agenda. This panel discussion will explore the impact of an event on business interruption, supply chain and operational risks. The panelists will also explore the insurance implications of physical damage cover.""";45;10.02.2015;5
Advisen15;Ben Beeson; Lockton;"""Business Interruption""";"""The recent Sony Pictures breach in the US has catapulted the potential impact of a cyber event on operations to the top of the corporate agenda. This panel discussion will explore the impact of an event on business interruption, supply chain and operational risks. The panelists will also explore the insurance implications of physical damage cover.""";45;10.02.2015;5
Advisen15;Mark Camillo; AIG;"""Business Interruption""";"""The recent Sony Pictures breach in the US has catapulted the potential impact of a cyber event on operations to the top of the corporate agenda. This panel discussion will explore the impact of an event on business interruption, supply chain and operational risks. The panelists will also explore the insurance implications of physical damage cover.""";45;10.02.2015;5
Advisen15;Vijay Rathour; Stroz Friedberg;"""Business Interruption""";"""The recent Sony Pictures breach in the US has catapulted the potential impact of a cyber event on operations to the top of the corporate agenda. This panel discussion will explore the impact of an event on business interruption, supply chain and operational risks. The panelists will also explore the insurance implications of physical damage cover.""";45;10.02.2015;5
Advisen15;Rebecca Bole; Advisen;"""“Who goes there?!”""";"""Who are the actors behind some of the highest profile cyber incidents – external or insiders…Cyber terrorists, activists, criminals, heating contractors?…does it really matter? This session will delve more into the “insider threat” and the human capital needs to combat these threats. Panelists will discuss overall threats; the greatest threat and discuss the implications for risk management and the insurance market with a particular emphasis on recruiting human capital to combat threats.""";30;10.02.2015;3
Advisen15;Erik Matson; Boyden Global Executive Search;"""“Who goes there?!”""";"""Who are the actors behind some of the highest profile cyber incidents – external or insiders…Cyber terrorists, activists, criminals, heating contractors?…does it really matter? This session will delve more into the “insider threat” and the human capital needs to combat these threats. Panelists will discuss overall threats; the greatest threat and discuss the implications for risk management and the insurance market with a particular emphasis on recruiting human capital to combat threats.""";30;10.02.2015;3
Advisen15;Eric Qualkenbush; BlackOps Partners;"""“Who goes there?!”""";"""Who are the actors behind some of the highest profile cyber incidents – external or insiders…Cyber terrorists, activists, criminals, heating contractors?…does it really matter? This session will delve more into the “insider threat” and the human capital needs to combat these threats. Panelists will discuss overall threats; the greatest threat and discuss the implications for risk management and the insurance market with a particular emphasis on recruiting human capital to combat threats.""";30;10.02.2015;3
Advisen15;Rebecca Bole; Advisen (Moderator);"""Reputational Risk – Real or Fallacy?""";"""A new threat to corporate reputation is emerging: a cyber attack by an insider or a third party. Data breach notification laws – led by the US – require even small companies to disclose breaches. Even without regulatory disclosure, the likelihood of the corporate and consumer public learning about a breach is high. How a corporation deals with such an event can have significant repercussions on a firm’s reputation – or can it? In this session, panelists will consider current perceptions of the reputational risk presented by a cyber event and will test these concerns on a set of recent data breach examples. Experts will also consider the insurance and risk mitigation services available for reputational risk.""";45;10.02.2015;4
Advisen15;Jennifer Coughlin; Lewis Brisbois;"""Reputational Risk – Real or Fallacy?""";"""A new threat to corporate reputation is emerging: a cyber attack by an insider or a third party. Data breach notification laws – led by the US – require even small companies to disclose breaches. Even without regulatory disclosure, the likelihood of the corporate and consumer public learning about a breach is high. How a corporation deals with such an event can have significant repercussions on a firm’s reputation – or can it? In this session, panelists will consider current perceptions of the reputational risk presented by a cyber event and will test these concerns on a set of recent data breach examples. Experts will also consider the insurance and risk mitigation services available for reputational risk.""";45;10.02.2015;4
Advisen15;Melanie Dougherty Thomas; Inform;"""Reputational Risk – Real or Fallacy?""";"""A new threat to corporate reputation is emerging: a cyber attack by an insider or a third party. Data breach notification laws – led by the US – require even small companies to disclose breaches. Even without regulatory disclosure, the likelihood of the corporate and consumer public learning about a breach is high. How a corporation deals with such an event can have significant repercussions on a firm’s reputation – or can it? In this session, panelists will consider current perceptions of the reputational risk presented by a cyber event and will test these concerns on a set of recent data breach examples. Experts will also consider the insurance and risk mitigation services available for reputational risk.""";45;10.02.2015;4
Advisen15;Matthew Hogg; Liberty Specialty Markets;"""Reputational Risk – Real or Fallacy?""";"""A new threat to corporate reputation is emerging: a cyber attack by an insider or a third party. Data breach notification laws – led by the US – require even small companies to disclose breaches. Even without regulatory disclosure, the likelihood of the corporate and consumer public learning about a breach is high. How a corporation deals with such an event can have significant repercussions on a firm’s reputation – or can it? In this session, panelists will consider current perceptions of the reputational risk presented by a cyber event and will test these concerns on a set of recent data breach examples. Experts will also consider the insurance and risk mitigation services available for reputational risk.""";45;10.02.2015;4
Advisen15;Ken Munro; Pen Test Partners LLP;"""Internet of Everything and More""";"""When machines are programmed to perform tasks independently, they become exposed to a hacking threat. This panel will look at the exposures posed by ‘smart machines’ and will address the wider implications for systems and networks and even critical infrastructure. What role can insurance play?""";30;10.02.2015;1
Advisen15;Cameron Azari; Epiq Systems;"""Live Cyber Incident Simulation Exercise: London 9th/10th February""";"""The military does it, MI5 does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. On 9th February 2015, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London on 10th February 2015.""";45;10.02.2015;6
Advisen15;Peter Foster; Willis;"""Live Cyber Incident Simulation Exercise: London 9th/10th February""";"""The military does it, MI5 does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. On 9th February 2015, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London on 10th February 2015.""";45;10.02.2015;6
Advisen15;Matthew Hogg; Liberty Specialty Markets;"""Live Cyber Incident Simulation Exercise: London 9th/10th February""";"""The military does it, MI5 does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. On 9th February 2015, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London on 10th February 2015.""";45;10.02.2015;6
Advisen15;Cheryl Martin; EMEIA Financial Services Advisory-Cyber Security;"""Live Cyber Incident Simulation Exercise: London 9th/10th February""";"""The military does it, MI5 does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. On 9th February 2015, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London on 10th February 2015.""";45;10.02.2015;6
Advisen15;Ira Scharf; BitSight Technologies;"""Live Cyber Incident Simulation Exercise: London 9th/10th February""";"""The military does it, MI5 does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. On 9th February 2015, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London on 10th February 2015.""";45;10.02.2015;6
Advisen15;Melissa Ventrone; Wilson Elser Moskowitz Edelman & Dicker LLP;"""Live Cyber Incident Simulation Exercise: London 9th/10th February""";"""The military does it, MI5 does it – increasingly corporations are doing it… Cyber war games are becoming a crucial part of testing your company’s responsiveness and resilience in the face of a ‘live’ cyber event. On 9th February 2015, Advisen will host a cyber-incident simulation exercise that will see selected teams of experts – representing the various stakeholders in a real event – work through a mock cyber incident in real time. An observation team will critique the handling of the incident and report back some best practices and key takeaways for our conference audience in London on 10th February 2015.""";45;10.02.2015;6
Advisen14;Tom Ruggieri;Advisen ;"""Opening Remarks """;"""?""";10;25.02.2014;2
Advisen14;Ben Beeson;Lockton;"""Opening Remarks """;"""?""";10;25.02.2014;2
Advisen14;Rt Hon Lord Reid of Cardowan;Institute for Security and Resilience Studies;"""Keynote """;"""?""";30;25.02.2014;1
Advisen14;Jim Blinn;Advisen ;"""Advisen Cyber Market Metrics""";"""Advisen’s assessment of the cyber insurance market, including current size, growth rate, and premium potential will be presented.""";15;25.02.2014;1
Advisen14;Alastair Allison; Zurich;"""Risk Management Issues and Practices""";"""This session identifies the principal cyber threats and threat actors, and proposes a framework for managing cyber risks. The results of the most recent Advisen/Zurich survey of risk managers also will be presented.""";45;25.02.2014;2
Advisen14;Jeremy Smith; Zurich;"""Risk Management Issues and Practices""";"""This session identifies the principal cyber threats and threat actors, and proposes a framework for managing cyber risks. The results of the most recent Advisen/Zurich survey of risk managers also will be presented.""";45;25.02.2014;2
Advisen14;Tim Mitchell; Willis;"""The Risk Manager’s Perspective on Data Security and Cyber Insurance""";"""A panel of risk managers will discuss their challenges and successes in managing data security and privacy risks. Additionally, panelists will discuss insurance options for cyber exposures and assess the performance of the cyber insurance market in addressing their needs.""";45;25.02.2014;4
Advisen14;Julia Graham; DLA Piper;"""The Risk Manager’s Perspective on Data Security and Cyber Insurance""";"""A panel of risk managers will discuss their challenges and successes in managing data security and privacy risks. Additionally, panelists will discuss insurance options for cyber exposures and assess the performance of the cyber insurance market in addressing their needs.""";45;25.02.2014;4
Advisen14;Lisa Meredith; Marks and Spencer Plc;"""The Risk Manager’s Perspective on Data Security and Cyber Insurance""";"""A panel of risk managers will discuss their challenges and successes in managing data security and privacy risks. Additionally, panelists will discuss insurance options for cyber exposures and assess the performance of the cyber insurance market in addressing their needs.""";45;25.02.2014;4
Advisen14;Michael Roberts; RBS;"""The Risk Manager’s Perspective on Data Security and Cyber Insurance""";"""A panel of risk managers will discuss their challenges and successes in managing data security and privacy risks. Additionally, panelists will discuss insurance options for cyber exposures and assess the performance of the cyber insurance market in addressing their needs.""";45;25.02.2014;4
Advisen14;Kristi Robles; Nelson Levine de Luca & Hamilton;"""Insurance Coverage and Coverage Issues""";"""What are the various types of policies could be triggered by a cyber event? What are the potential overlaps and gaps? What are the challenges in assembling a tower of cyber coverage?  This session will explore the evolution of cyber insurance products and offer practical insights for structuring an effective program to protect against cyber-related losses.""";45;25.02.2014;5
Advisen14;Peter Foster; Willis;"""Insurance Coverage and Coverage Issues""";"""What are the various types of policies could be triggered by a cyber event? What are the potential overlaps and gaps? What are the challenges in assembling a tower of cyber coverage?  This session will explore the evolution of cyber insurance products and offer practical insights for structuring an effective program to protect against cyber-related losses.""";45;25.02.2014;5
Advisen14;Lisa Hansford-Smith; XL Insurance Company;"""Insurance Coverage and Coverage Issues""";"""What are the various types of policies could be triggered by a cyber event? What are the potential overlaps and gaps? What are the challenges in assembling a tower of cyber coverage?  This session will explore the evolution of cyber insurance products and offer practical insights for structuring an effective program to protect against cyber-related losses.""";45;25.02.2014;5
Advisen14;Alessandro Lezzi; Beazley;"""Insurance Coverage and Coverage Issues""";"""What are the various types of policies could be triggered by a cyber event? What are the potential overlaps and gaps? What are the challenges in assembling a tower of cyber coverage?  This session will explore the evolution of cyber insurance products and offer practical insights for structuring an effective program to protect against cyber-related losses.""";45;25.02.2014;5
Advisen14;Fredrik Motzfeldt; JLT;"""Insurance Coverage and Coverage Issues""";"""What are the various types of policies could be triggered by a cyber event? What are the potential overlaps and gaps? What are the challenges in assembling a tower of cyber coverage?  This session will explore the evolution of cyber insurance products and offer practical insights for structuring an effective program to protect against cyber-related losses.""";45;25.02.2014;5
Advisen14;Matthew Hogg; LIU;"""Emerging Risks and the Future of Cyber Insurance""";"""As the cyber threat landscape evolves, underwriters are challenged to keep pace. Panelists will discuss current and emerging exposures such as the cyber supply chain, property damage and BI from cyber events, and “The Internet of Things,” and will explain how insurers are responding to them.""";45;25.02.2014;5
Advisen14;Erica Constance; Willis;"""Emerging Risks and the Future of Cyber Insurance""";"""As the cyber threat landscape evolves, underwriters are challenged to keep pace. Panelists will discuss current and emerging exposures such as the cyber supply chain, property damage and BI from cyber events, and “The Internet of Things,” and will explain how insurers are responding to them.""";45;25.02.2014;5
Advisen14;Graeme Newman; CFC Underwriting;"""Emerging Risks and the Future of Cyber Insurance""";"""As the cyber threat landscape evolves, underwriters are challenged to keep pace. Panelists will discuss current and emerging exposures such as the cyber supply chain, property damage and BI from cyber events, and “The Internet of Things,” and will explain how insurers are responding to them.""";45;25.02.2014;5
Advisen14;Ira Scharf; BitSight;"""Emerging Risks and the Future of Cyber Insurance""";"""As the cyber threat landscape evolves, underwriters are challenged to keep pace. Panelists will discuss current and emerging exposures such as the cyber supply chain, property damage and BI from cyber events, and “The Internet of Things,” and will explain how insurers are responding to them.""";45;25.02.2014;5
Advisen14;Stephen Wares; Marsh;"""Emerging Risks and the Future of Cyber Insurance""";"""As the cyber threat landscape evolves, underwriters are challenged to keep pace. Panelists will discuss current and emerging exposures such as the cyber supply chain, property damage and BI from cyber events, and “The Internet of Things,” and will explain how insurers are responding to them.""";45;25.02.2014;5
Advisen14;Noona Barlow;AIG;"""Mid-day Remarks""";"""?""";20;25.02.2014;1
Advisen14;Bridget Treacy; Hunton & Williams;"""Impact on Proposed European Data Protection Reform""";"""Data protection laws are being reformed at an EU level.  The new regulatory landscape will impose tighter controls on data use and heavy penalties for violation (possibly up to 5% of global revenue).  The reforms will affect insurers and their clients alike in key areas including data breach; profiling and big data analytics; use of genetic data; and privacy risk governance.  Our panelists will describe the current status of the reforms, and provide practical insights on what the reforms mean for the insurance market.""";45;25.02.2014;5
Advisen14;Jamie Bouloux; AIG;"""Impact on Proposed European Data Protection Reform""";"""Data protection laws are being reformed at an EU level.  The new regulatory landscape will impose tighter controls on data use and heavy penalties for violation (possibly up to 5% of global revenue).  The reforms will affect insurers and their clients alike in key areas including data breach; profiling and big data analytics; use of genetic data; and privacy risk governance.  Our panelists will describe the current status of the reforms, and provide practical insights on what the reforms mean for the insurance market.""";45;25.02.2014;5
Advisen14;John Bowman; UK Ministry of Justice;"""Impact on Proposed European Data Protection Reform""";"""Data protection laws are being reformed at an EU level.  The new regulatory landscape will impose tighter controls on data use and heavy penalties for violation (possibly up to 5% of global revenue).  The reforms will affect insurers and their clients alike in key areas including data breach; profiling and big data analytics; use of genetic data; and privacy risk governance.  Our panelists will describe the current status of the reforms, and provide practical insights on what the reforms mean for the insurance market.""";45;25.02.2014;5
Advisen14;Mark Deem; Edwards Wildman;"""Impact on Proposed European Data Protection Reform""";"""Data protection laws are being reformed at an EU level.  The new regulatory landscape will impose tighter controls on data use and heavy penalties for violation (possibly up to 5% of global revenue).  The reforms will affect insurers and their clients alike in key areas including data breach; profiling and big data analytics; use of genetic data; and privacy risk governance.  Our panelists will describe the current status of the reforms, and provide practical insights on what the reforms mean for the insurance market.""";45;25.02.2014;5
Advisen14;Jyn Shultze-Melling; Allianz;"""Impact on Proposed European Data Protection Reform""";"""Data protection laws are being reformed at an EU level.  The new regulatory landscape will impose tighter controls on data use and heavy penalties for violation (possibly up to 5% of global revenue).  The reforms will affect insurers and their clients alike in key areas including data breach; profiling and big data analytics; use of genetic data; and privacy risk governance.  Our panelists will describe the current status of the reforms, and provide practical insights on what the reforms mean for the insurance market.""";45;25.02.2014;5
Advisen14;Ben Beeson; Lockton;"""Government Cyber Security Frameworks""";"""The UK’s Cyber Security Strategy and the U.S. National Institute of Standards and Technology’s cybersecurity framework were created to address the national security consequences of cybercrime, cyber terrorism and cyber warfare. What are the practical implications of these initiatives for businesses? What liability issues do they raise? This session will explain the initiatives and discuss their potential impacts on organisations and their insurers.""";45;25.02.2014;5
Advisen14;Gerald Ferguson; BakerHostetler;"""Government Cyber Security Frameworks""";"""The UK’s Cyber Security Strategy and the U.S. National Institute of Standards and Technology’s cybersecurity framework were created to address the national security consequences of cybercrime, cyber terrorism and cyber warfare. What are the practical implications of these initiatives for businesses? What liability issues do they raise? This session will explain the initiatives and discuss their potential impacts on organisations and their insurers.""";45;25.02.2014;5
Advisen14;Mark Fishleigh; BAE Systems Detica;"""Government Cyber Security Frameworks""";"""The UK’s Cyber Security Strategy and the U.S. National Institute of Standards and Technology’s cybersecurity framework were created to address the national security consequences of cybercrime, cyber terrorism and cyber warfare. What are the practical implications of these initiatives for businesses? What liability issues do they raise? This session will explain the initiatives and discuss their potential impacts on organisations and their insurers.""";45;25.02.2014;5
Advisen14;Russell Price; Continuity Forum;"""Government Cyber Security Frameworks""";"""The UK’s Cyber Security Strategy and the U.S. National Institute of Standards and Technology’s cybersecurity framework were created to address the national security consequences of cybercrime, cyber terrorism and cyber warfare. What are the practical implications of these initiatives for businesses? What liability issues do they raise? This session will explain the initiatives and discuss their potential impacts on organisations and their insurers.""";45;25.02.2014;5
Advisen14;Sarah Stephens; Aon;"""Government Cyber Security Frameworks""";"""The UK’s Cyber Security Strategy and the U.S. National Institute of Standards and Technology’s cybersecurity framework were created to address the national security consequences of cybercrime, cyber terrorism and cyber warfare. What are the practical implications of these initiatives for businesses? What liability issues do they raise? This session will explain the initiatives and discuss their potential impacts on organisations and their insurers.""";45;25.02.2014;5
Advisen14;Tom Ruggieri; Advisen;"""The View from the Top""";"""A panel of senior insurance industry executives will offer their perspectives on the strategic significance of cyber insurance products, and discuss the forces at work on the insurance marketplace.""";45;25.02.2014;5
Advisen14;Warren Downey; JLT;"""The View from the Top""";"""A panel of senior insurance industry executives will offer their perspectives on the strategic significance of cyber insurance products, and discuss the forces at work on the insurance marketplace.""";45;25.02.2014;5
Advisen14;Matthew Fairfield; ANV Holdings BV;"""The View from the Top""";"""A panel of senior insurance industry executives will offer their perspectives on the strategic significance of cyber insurance products, and discuss the forces at work on the insurance marketplace.""";45;25.02.2014;5
Advisen14;Philippe Gouraud; AIG;"""The View from the Top""";"""A panel of senior insurance industry executives will offer their perspectives on the strategic significance of cyber insurance products, and discuss the forces at work on the insurance marketplace.""";45;25.02.2014;5
Advisen14;Richard Hodson; Oval Insurance Broking Limited;"""The View from the Top""";"""A panel of senior insurance industry executives will offer their perspectives on the strategic significance of cyber insurance products, and discuss the forces at work on the insurance marketplace.""";45;25.02.2014;5